Show filters
1,715 Total Results
Displaying 191-200 of 1,715
Sort by:
Attacker Value
Unknown
CVE-2024-22126
Disclosure Date: February 13, 2024 (last updated February 11, 2025)
The User Admin application of SAP NetWeaver AS for Java - version 7.50, insufficiently validates and improperly encodes the incoming URL parameters before including them into the redirect URL. This results in Cross-Site Scripting (XSS) vulnerability, leading to a high impact on confidentiality and mild impact on integrity and availability.
0
Attacker Value
Unknown
CVE-2024-22125
Disclosure Date: January 09, 2024 (last updated January 13, 2024)
Under certain conditions the Microsoft Edge browser extension (SAP GUI connector for Microsoft Edge) - version 1.0, allows an attacker to access highly sensitive information which would otherwise be restricted causing high impact on confidentiality.
0
Attacker Value
Unknown
CVE-2024-22124
Disclosure Date: January 09, 2024 (last updated January 23, 2024)
Under certain conditions, Internet Communication Manager (ICM) or SAP Web Dispatcher - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22_EXT, WEBDISP 7.22_EXT, WEBDISP 7.53, WEBDISP 7.54, could allow an attacker to access information which would otherwise be restricted causing high impact on confidentiality.
0
Attacker Value
Unknown
CVE-2024-21738
Disclosure Date: January 09, 2024 (last updated January 12, 2024)
SAP NetWeaver ABAP Application Server and ABAP Platform do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An attacker with low privileges can cause limited impact to confidentiality of the application data after successful exploitation.
0
Attacker Value
Unknown
CVE-2024-21737
Disclosure Date: January 09, 2024 (last updated January 17, 2024)
In SAP Application Interface Framework File Adapter - version 702, a high privilege user can use a function module to traverse through various layers and execute OS commands directly. By this, such user can control the behaviour of the application. This leads to considerable impact on confidentiality, integrity and availability.
0
Attacker Value
Unknown
CVE-2024-21736
Disclosure Date: January 09, 2024 (last updated September 28, 2024)
SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-21735
Disclosure Date: January 09, 2024 (last updated January 13, 2024)
SAP LT Replication Server - version S4CORE 103, S4CORE 104, S4CORE 105, S4CORE 106, S4CORE 107, S4CORE 108, does not perform necessary authorization checks. This could allow an attacker with high privileges to perform unintended actions, resulting in escalation of privileges, which has High impact on confidentiality, integrity and availability of the system.
0
Attacker Value
Unknown
CVE-2024-21734
Disclosure Date: January 09, 2024 (last updated January 13, 2024)
SAP Marketing (Contacts App) - version 160, allows an attacker with low privileges to trick a user to open malicious page which could lead to a very convincing phishing attack with low impact on confidentiality and integrity of the application.
0
Attacker Value
Unknown
CVE-2023-46918
Disclosure Date: December 27, 2023 (last updated January 06, 2024)
Phlox com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus has an Android manifest file that contains an entry with the android:allowBackup attribute set to true. This could be leveraged by an attacker with physical access to the device.
0
Attacker Value
Unknown
CVE-2023-46919
Disclosure Date: December 27, 2023 (last updated October 01, 2024)
Phlox com.phlox.simpleserver (aka Simple HTTP Server) 1.8 and com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus have a hardcoded aKySWb2jjrr4dzkYXczKRt7K (AES) encryption key. An attacker with physical access to the application's source code or binary can extract this key & use it decrypt the TLS secret.
0