Show filters
1,715 Total Results
Displaying 201-210 of 1,715
Sort by:
Attacker Value
Unknown
CVE-2023-43955
Disclosure Date: December 27, 2023 (last updated January 10, 2024)
The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandles external intents through WebView. This allows attackers to execute arbitrary code, create arbitrary files. and perform arbitrary downloads via JavaScript that uses takeBlobDownloadData.
0
Attacker Value
Unknown
CVE-2023-50424
Disclosure Date: December 12, 2023 (last updated September 28, 2024)
SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
0
Attacker Value
Unknown
CVE-2023-6542
Disclosure Date: December 12, 2023 (last updated December 19, 2023)
Due to lack of proper authorization checks in Emarsys SDK for Android, an attacker can call a particular activity and can forward himself web pages and/or deep links without any validation directly from the host application. On successful attack, an attacker could navigate to arbitrary URL including application deep links on the device.
0
Attacker Value
Unknown
CVE-2023-50423
Disclosure Date: December 12, 2023 (last updated September 28, 2024)
SAP BTP Security Services Integration Library ([Python] sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
0
Attacker Value
Unknown
CVE-2023-50422
Disclosure Date: December 12, 2023 (last updated September 28, 2024)
SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) - versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
0
Attacker Value
Unknown
CVE-2023-49587
Disclosure Date: December 12, 2023 (last updated December 15, 2023)
SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated function modules which can read or modify data of same or other component without user interaction over the network.
0
Attacker Value
Unknown
CVE-2023-49584
Disclosure Date: December 12, 2023 (last updated December 16, 2023)
SAP Fiori launchpad - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, UI_700 200, SAP_BASIS 793, allows an attacker to use HTTP verb POST on read-only service causing low impact on Confidentiality of the application.
0
Attacker Value
Unknown
CVE-2023-49583
Disclosure Date: December 12, 2023 (last updated September 28, 2024)
SAP BTP Security Services Integration Library ([Node.js] @sap/xssec - versions < 3.6.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
0
Attacker Value
Unknown
CVE-2023-49581
Disclosure Date: December 12, 2023 (last updated December 19, 2023)
SAP GUI for Windows and SAP GUI for Java allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to write data to a database table. By doing so the attacker could increase response times of the AS ABAP, leading to mild impact on availability.
0
Attacker Value
Unknown
CVE-2023-49580
Disclosure Date: December 12, 2023 (last updated September 28, 2024)
SAP GUI for Windows and SAP GUI for Java - versions SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to create Layout configurations of the ABAP List Viewer and with this causing a mild impact on integrity and availability, e.g. also increasing the response times of the AS ABAP.
0