Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-25j4-vg62-44m4

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration of Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 enables a remote Notify capability without the Extended Notify Security features, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.

The default configuration of Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 enables a remote Notify capability without the Extended Notify Security features, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.

EPSS

Процентиль: 46%
0.00228
Низкий

Связанные уязвимости

nvd
почти 10 лет назад

The default configuration of Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 enables a remote Notify capability without the Extended Notify Security features, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.

fstec
почти 10 лет назад

Уязвимость программы автоматизации работы пользователей Radia Client Automation, позволяющая нарушителю обойти существующие ограничения доступа

EPSS

Процентиль: 46%
0.00228
Низкий