cve/2015/CVE-2015-7863.md

18 lines
909 B
Markdown
Raw Normal View History

2024-06-09 00:33:16 +00:00
### [CVE-2015-7863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7863)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The default configuration of Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 enables a remote Notify capability without the Extended Notify Security features, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
### POC
#### Reference
2024-06-18 02:51:15 +02:00
- https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features
2024-06-09 00:33:16 +00:00
#### Github
No PoCs found on GitHub currently.