Vulnerability Description
The default configuration of Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 enables a remote Notify capability without the Extended Notify Security features, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Accelerite | Radia Client Automation | 7.9 |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id/1033862
- https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-sVendor Advisory
- http://www.securitytracker.com/id/1033862
- https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-sVendor Advisory
FAQ
What is CVE-2015-7863?
CVE-2015-7863 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The default configuration of Persistent Accelerite Radia Client Automation (formerly HP Client Automation) 7.9 through 9.1 before 2015-02-19 enables a remote Notify capability without the Extended Not...
How severe is CVE-2015-7863?
CVE-2015-7863 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7863?
Check the references section above for vendor advisories and patch information. Affected products include: Accelerite Radia Client Automation.