Show filters
101 Total Results
Displaying 21-30 of 101
Sort by:
Attacker Value
Unknown

CVE-2025-0068

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
An obsolete functionality in SAP NetWeaver Application Server ABAP did not perform necessary authorization checks. Because of this, an authenticated attacker could obtain information that would otherwise be restricted. It has no impact on integrity or availability on the application.
0
Attacker Value
Unknown

CVE-2025-0067

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
Due to a missing authorization check on service endpoints in the SAP NetWeaver Application Server Java, an attacker with standard user role can create JCo connection entries, which are used for remote function calls from or to the application server. This could lead to low impact on confidentiality, integrity, and availability of the application.
0
Attacker Value
Unknown

CVE-2025-0066

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
Under certain conditions SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) allows an attacker to access restricted information due to weak access controls. This can have a significant impact on the confidentiality, integrity, and availability of an application
0
Attacker Value
Unknown

CVE-2025-0063

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP NetWeaver AS ABAP and ABAP Platform does not check for authorization when a user executes some RFC function modules. This could lead to an attacker with basic user privileges to gain control over the data in Informix database, leading to complete compromise of confidentiality, integrity and availability.
0
Attacker Value
Unknown

CVE-2025-0061

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP BusinessObjects Business Intelligence Platform allows an unauthenticated attacker to perform session hijacking over the network without any user interaction, due to an information disclosure vulnerability. Attacker can access and modify all the data of the application.
0
Attacker Value
Unknown

CVE-2025-0060

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP BusinessObjects Business Intelligence Platform allows an authenticated user with restricted access to inject malicious JS code which can read sensitive information from the server and send it to the attacker. The attacker could further use this information to impersonate as a high privileged user causing high impact on confidentiality and integrity of the application.
0
Attacker Value
Unknown

CVE-2025-0059

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application.
0
Attacker Value
Unknown

CVE-2025-0058

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
In SAP Business Workflow and SAP Flexible Workflow, an authenticated attacker can manipulate a parameter in an otherwise legitimate resource request to view sensitive information that should otherwise be restricted. The attacker does not have the ability to modify the information or to make the information unavailable.
0
Attacker Value
Unknown

CVE-2025-0057

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP NetWeaver AS JAVA (User Admin Application) is vulnerable to stored cross site scripting vulnerability. An attacker posing as an admin can upload a photo with malicious JS content. When a victim visits the vulnerable component, the attacker can read and modify information within the scope of victim's web browser.
0
Attacker Value
Unknown

CVE-2025-0056

Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP GUI for Java saves user input on the client PC to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application.
0