Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mobile platform vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2018-2459
Users of an SAP Mobile Platform (version 3.0) Offline OData application, which uses Offline OData-supplied delta tokens (which is on by default), occasionally receive some data values of a different user.
Sap Mobile Platform 3.0
6.5
CVSSv3
CVE-2022-25210
Jenkins Convertigo Mobile Platform Plugin 1.1 and previous versions uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.
Jenkins Convertigo Mobile Platform
NA
CVE-2015-2818
XML external entity (XXE) vulnerability in SAP Mobile Platform 3 allows remote malicious users to send requests to intranet servers via crafted XML, aka SAP Security Note 2125513.
Sap Mobile Platform 3.0
NA
CVE-2015-6664
XML external entity (XXE) vulnerability in the application import functionality in SAP Mobile Platform 2.3 allows remote malicious users to read arbitrary files and possibly have other unspecified impact via crafted XML data, aka SAP Security Note 2152227.
Sap Mobile Platform 2.3
5.5
CVSSv3
CVE-2015-7731
SAP Mobile Platform 3.0 SP05 ClientHub allows malicious users to obtain the keystream and other sensitive information via the DataVault, aka SAP Security Note 2094830.
Sap Mobile Platform 3.0
7.5
CVSSv3
CVE-2019-0274
SAP Mobile Platform SDK allows an malicious user to prevent legitimate users from accessing a service, either by crashing or flooding the service (i.e. denial of service). Fixed in versions 3.1 SP03 PL02, SDK 3.1 SP04, or later.
Sap Mobile Platform Sdk 3.0
6.5
CVSSv3
CVE-2015-5248
Reflected file download vulnerability in Red Hat Feedhenry Enterprise Mobile Application Platform.
Redhat Feedhenry Enterprise Mobile Application Platform -
6.1
CVSSv3
CVE-2020-1723
A flaw was found in Keycloak Gatekeeper (Louketo). The logout endpoint can be abused to redirect logged-in users to arbitrary web pages. Affected versions of Keycloak Gatekeeper (Louketo): 6.0.1, 7.0.0
Redhat Mobile Application Platform 4.0
Keycloak Gatekeeper Project Keycloak Gatekeeper 6.0.1
Keycloak Gatekeeper Project Keycloak Gatekeeper 7.0.0
7.8
CVSSv3
CVE-2021-38410
AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.
Aveva System Platform 2020
Aveva Platform Common Services 4.5.2
Aveva Platform Common Services 4.5.1
Aveva Platform Common Services 4.5.0
Aveva Platform Common Services 4.4.6
Aveva Batch Management 2020
Aveva Enterprise Data Management 2020
Aveva Manufacturing Execution System 2020
Aveva Mobile Operator 2020
Aveva Work Tasks 2020
8.5
CVSSv3
CVE-2022-3337
It was possible for a user to delete a VPN profile from WARP mobile client on iOS platform despite the Lock WARP switch https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch feature being enabled on Zero Trust Platform. ...
Cloudflare Warp Mobile Client
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »