Accelerite : Security Vulnerabilities, CVEs,
The default configuration of Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 enables a remote Notify capability without the Extended Notify Security features, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
Max CVSS
5.0
EPSS Score
0.14%
Published
2015-10-19
Updated
2016-12-24
Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 improperly implements the Role Based Access Control feature, which might allow remote attackers to modify an account's role assignments via unspecified vectors.
Max CVSS
5.0
EPSS Score
0.18%
Published
2015-10-19
Updated
2016-12-24
Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending unspecified commands in an environment that lacks relationship-based firewalling.
Max CVSS
10.0
EPSS Score
55.03%
Published
2015-10-19
Updated
2016-12-24
Stack-based buffer overflow in the agent in Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending a large amount of data in an environment that lacks relationship-based firewalling.
Max CVSS
10.0
EPSS Score
66.27%
Published
2015-10-19
Updated
2016-12-24
4 vulnerabilities found