Show filters
1,715 Total Results
Displaying 211-220 of 1,715
Sort by:
Attacker Value
Unknown
CVE-2023-49578
Disclosure Date: December 12, 2023 (last updated September 28, 2024)
SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity of the application.
0
Attacker Value
Unknown
CVE-2023-49577
Disclosure Date: December 12, 2023 (last updated December 20, 2023)
The SAP HCM (SMART PAYE solution) - versions S4HCMCIE 100, SAP_HRCIE 600, SAP_HRCIE 604, SAP_HRCIE 608, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.
0
Attacker Value
Unknown
CVE-2023-49058
Disclosure Date: December 12, 2023 (last updated December 15, 2023)
SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.
0
Attacker Value
Unknown
CVE-2023-42481
Disclosure Date: December 12, 2023 (last updated September 28, 2024)
In SAP Commerce Cloud - versions HY_COM 1905, HY_COM 2005, HY_COM2105, HY_COM 2011, HY_COM 2205, COM_CLOUD 2211, a locked B2B user can misuse the forgotten password functionality to un-block his user account again and re-gain access if SAP Commerce Cloud - Composable Storefront is used as storefront, due to weak access controls in place. This leads to a considerable impact on confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2023-42479
Disclosure Date: December 12, 2023 (last updated December 16, 2023)
An unauthenticated attacker can embed a hidden access to a Biller Direct URL in a frame which, when loaded by the user, will submit a cross-site scripting request to the Biller Direct system. This can result in the disclosure or modification of non-sensitive information.
0
Attacker Value
Unknown
CVE-2023-42478
Disclosure Date: December 12, 2023 (last updated December 14, 2023)
SAP Business Objects Business Intelligence Platform is vulnerable to stored XSS allowing an attacker to upload agnostic documents in the system which when opened by any other user could lead to high impact on integrity of the application.
0
Attacker Value
Unknown
CVE-2023-42476
Disclosure Date: December 12, 2023 (last updated December 14, 2023)
SAP Business Objects Web Intelligence - version 420, allows an authenticated attacker to inject JavaScript code into Web Intelligence documents which is then executed in the victim’s browser each time the vulnerable page is visited. Successful exploitation can lead to exposure of the data that the user has access to. In the worst case, attacker could access data from reporting databases.
0
Attacker Value
Unknown
CVE-2023-29770
Disclosure Date: November 28, 2023 (last updated December 02, 2023)
In Sentrifugo 3.5, the AssetsController::uploadsaveAction function allows an authenticated attacker to upload any file without extension filtering.
0
Attacker Value
Unknown
CVE-2023-42480
Disclosure Date: November 14, 2023 (last updated November 21, 2023)
The unauthenticated attacker in NetWeaver AS Java Logon application - version 7.50, can brute force the login functionality to identify the legitimate user ids. This will have an impact on confidentiality but there is no other impact on integrity or availability.
0
Attacker Value
Unknown
CVE-2023-41366
Disclosure Date: November 14, 2023 (last updated November 21, 2023)
Under certain condition SAP NetWeaver Application Server ABAP - versions KERNEL 722, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.94, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT, allows an unauthenticated attacker to access the unintended data due to the lack of restrictions applied which may lead to low impact in confidentiality and no impact on the integrity and availability of the application.
0