Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mobile platform vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2015-7731
SAP Mobile Platform 3.0 SP05 ClientHub allows malicious users to obtain the keystream and other sensitive information via the DataVault, aka SAP Security Note 2094830.
Sap Mobile Platform 3.0
6.8
CVSSv2
CVE-2015-6664
XML external entity (XXE) vulnerability in the application import functionality in SAP Mobile Platform 2.3 allows remote malicious users to read arbitrary files and possibly have other unspecified impact via crafted XML data, aka SAP Security Note 2152227.
Sap Mobile Platform 2.3
5
CVSSv2
CVE-2018-2459
Users of an SAP Mobile Platform (version 3.0) Offline OData application, which uses Offline OData-supplied delta tokens (which is on by default), occasionally receive some data values of a different user.
Sap Mobile Platform 3.0
4
CVSSv2
CVE-2022-25210
Jenkins Convertigo Mobile Platform Plugin 1.1 and previous versions uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.
Jenkins Convertigo Mobile Platform
4
CVSSv2
CVE-2020-6177
SAP Mobile Platform, version 3.0, does not sufficiently validate an XML document accepted from an untrusted source which could lead to partial denial of service. Since SAP Mobile Platform does not allow External-Entity resolving, there is no issue of leaking content of files on t...
Sap Mobile Platform 3.0
5
CVSSv2
CVE-2019-0274
SAP Mobile Platform SDK allows an malicious user to prevent legitimate users from accessing a service, either by crashing or flooding the service (i.e. denial of service). Fixed in versions 3.1 SP03 PL02, SDK 3.1 SP04, or later.
Sap Mobile Platform Sdk 3.0
4.3
CVSSv2
CVE-2015-5248
Reflected file download vulnerability in Red Hat Feedhenry Enterprise Mobile Application Platform.
Redhat Feedhenry Enterprise Mobile Application Platform -
5.8
CVSSv2
CVE-2020-1723
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
Redhat Mobile Application Platform 4.0
Keycloak Gatekeeper Project Keycloak Gatekeeper 6.0.1
Keycloak Gatekeeper Project Keycloak Gatekeeper 7.0.0
NA
CVE-2021-38410
AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.
Aveva System Platform 2020
Aveva Platform Common Services 4.5.2
Aveva Platform Common Services 4.5.1
Aveva Platform Common Services 4.5.0
Aveva Platform Common Services 4.4.6
Aveva Batch Management 2020
Aveva Enterprise Data Management 2020
Aveva Manufacturing Execution System 2020
Aveva Mobile Operator 2020
Aveva Work Tasks 2020
NA
CVE-2022-3337
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature being enabled on Zero Trust Platform. ...
Cloudflare Warp Mobile Client
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »