Known Vulnerabilities for Afaria by Sap
Listed below are 7 of the newest known vulnerabilities associated with "Afaria" by "Sap".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
|CVE||Shortened Description||Severity||Publish Date||Last Modified|
|CVE-2015-8753||SAP Afaria 7.0.6001.5 allows remote attackers to bypass authorization checks and wipe or lock mobile devices via a crafted re...||9.1 - CRITICAL||2016-01-08||2018-12-10|
|CVE-2015-6663||Cross-site scripting (XSS) vulnerability in the Client form in the Device Inspector page in SAP Afaria 7 allows remote attack...||4.3 - MEDIUM||2015-08-24||2018-12-10|
|CVE-2015-4161||SAP Afaria does not properly restrict access to unspecified functionality, which allows remote attackers to obtain sensitive ...||7.5 - HIGH||2015-06-02||2016-12-31|
|CVE-2015-4092||Buffer overflow in the XComms process in SAP Afaria 7.00.6620.2 SP5 allows remote attackers to cause a denial of service (cra...||7.5 - HIGH||2015-05-26||2018-12-10|
|CVE-2015-3449||The Windows client in SAP Afaria 7.0.6398.0 uses weak permissions (Everyone: read and Everyone: write) for the install folder...||7.2 - HIGH||2015-07-16||2016-12-06|
|CVE-2015-2820||Buffer overflow in XcListener in SAP Afaria 7.0.6001.5 allows remote attackers to cause a denial of service (process terminat...||5 - MEDIUM||2015-04-01||2018-12-10|
|CVE-2015-2816||The XcListener in SAP Afaria 7.0.6001.5 does not properly restrict access, which allows remote attackers to have unspecified ...||7.5 - HIGH||2015-04-01||2018-12-10|
Known Affected Configurations (CPE V2.3)
Popular searches for Afaria
AP Afaria is a mobile device management software product. It helps large organizations connect mobile devices such as smartphones and tablet computers to the company network, and to simplify the information technology tasks associated with buying, deploying, securing and maintaining such devices.