Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mobile platform vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2022-34199
Jenkins Convertigo Mobile Platform Plugin 1.1 and previous versions stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Jenkins Convertigo Mobile Platform
8.8
CVSSv3
CVE-2022-34200
A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and previous versions allows malicious users to connect to an attacker-specified URL.
Jenkins Convertigo Mobile Platform
4.3
CVSSv3
CVE-2020-6177
SAP Mobile Platform, version 3.0, does not sufficiently validate an XML document accepted from an untrusted source which could lead to partial denial of service. Since SAP Mobile Platform does not allow External-Entity resolving, there is no issue of leaking content of files on t...
Sap Mobile Platform 3.0
6.5
CVSSv3
CVE-2022-25210
Jenkins Convertigo Mobile Platform Plugin 1.1 and previous versions uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.
Jenkins Convertigo Mobile Platform
7.5
CVSSv3
CVE-2018-2459
Users of an SAP Mobile Platform (version 3.0) Offline OData application, which uses Offline OData-supplied delta tokens (which is on by default), occasionally receive some data values of a different user.
Sap Mobile Platform 3.0
7.5
CVSSv3
CVE-2019-0274
SAP Mobile Platform SDK allows an malicious user to prevent legitimate users from accessing a service, either by crashing or flooding the service (i.e. denial of service). Fixed in versions 3.1 SP03 PL02, SDK 3.1 SP04, or later.
Sap Mobile Platform Sdk 3.0
6.5
CVSSv3
CVE-2015-5248
Reflected file download vulnerability in Red Hat Feedhenry Enterprise Mobile Application Platform.
Redhat Feedhenry Enterprise Mobile Application Platform -
6.1
CVSSv3
CVE-2020-1723
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
Redhat Mobile Application Platform 4.0
Keycloak Gatekeeper Project Keycloak Gatekeeper 6.0.1
Keycloak Gatekeeper Project Keycloak Gatekeeper 7.0.0
7.8
CVSSv3
CVE-2021-38410
AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.
Aveva System Platform 2020
Aveva Platform Common Services 4.5.2
Aveva Platform Common Services 4.5.1
Aveva Platform Common Services 4.5.0
Aveva Platform Common Services 4.4.6
Aveva Batch Management 2020
Aveva Enterprise Data Management 2020
Aveva Manufacturing Execution System 2020
Aveva Mobile Operator 2020
Aveva Work Tasks 2020
8.5
CVSSv3
CVE-2022-3337
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature being enabled on Zero Trust Platform. ...
Cloudflare Warp Mobile Client
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »