Show filters
295 Total Results
Displaying 31-40 of 295
Sort by:
Attacker Value
Unknown
CVE-2024-22126
Disclosure Date: February 13, 2024 (last updated February 11, 2025)
The User Admin application of SAP NetWeaver AS for Java - version 7.50, insufficiently validates and improperly encodes the incoming URL parameters before including them into the redirect URL. This results in Cross-Site Scripting (XSS) vulnerability, leading to a high impact on confidentiality and mild impact on integrity and availability.
0
Attacker Value
Unknown
CVE-2024-24569
Disclosure Date: February 01, 2024 (last updated February 10, 2024)
The Pixee Java Code Security Toolkit is a set of security APIs meant to help secure Java code. `ZipSecurity#isBelowCurrentDirectory` is vulnerable to a partial-path traversal bypass. To be vulnerable to the bypass, the application must use toolkit version <=1.1.1, use ZipSecurity as a guard against path traversal, and have an exploit path. Although the control still protects attackers from escaping the application path into higher level directories (e.g., /etc/), it will allow "escaping" into sibling paths. For example, if your running path is /my/app/path you an attacker could navigate into /my/app/path-something-else. This vulnerability is patched in 1.1.2.
0
Attacker Value
Unknown
CVE-2023-42480
Disclosure Date: November 14, 2023 (last updated November 21, 2023)
The unauthenticated attacker in NetWeaver AS Java Logon application - version 7.50, can brute force the login functionality to identify the legitimate user ids. This will have an impact on confidentiality but there is no other impact on integrity or availability.
0
Attacker Value
Unknown
CVE-2023-44483
Disclosure Date: October 20, 2023 (last updated February 14, 2025)
All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled. Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.
0
Attacker Value
Unknown
CVE-2023-42477
Disclosure Date: October 10, 2023 (last updated October 17, 2023)
SAP NetWeaver AS Java (GRMG Heartbeat application) - version 7.50, allows an attacker to send a crafted request from a vulnerable web application, causing limited impact on confidentiality and integrity of the application.
0
Attacker Value
Unknown
CVE-2022-4132
Disclosure Date: October 04, 2023 (last updated October 09, 2023)
A flaw was found in JSS. A memory leak in JSS requires non-standard configuration but is a low-effort DoS vector if configured that way (repeatedly hitting the login page).
0
Attacker Value
Unknown
CVE-2023-40309
Disclosure Date: September 12, 2023 (last updated September 28, 2024)
SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.
0
Attacker Value
Unknown
CVE-2023-40308
Disclosure Date: September 12, 2023 (last updated September 26, 2024)
SAP CommonCryptoLib allows an unauthenticated attacker to craft a request, which when submitted to an open port causes a memory corruption error in a library which in turn causes the target component to crash making it unavailable. There is no ability to view or modify any information.
0
Attacker Value
Unknown
CVE-2023-31405
Disclosure Date: July 11, 2023 (last updated October 08, 2023)
SAP NetWeaver AS for Java - versions ENGINEAPI 7.50, SERVERCORE 7.50, J2EE-APPS 7.50, allows an unauthenticated attacker to craft a request over the network which can result in unwarranted modifications to a system log without user interaction. There is no ability to view any information or any effect on availability.
0
Attacker Value
Unknown
CVE-2023-32787
Disclosure Date: May 15, 2023 (last updated April 03, 2024)
The OPC UA Legacy Java Stack before 6f176f2 enables an attacker to block OPC UA server applications via uncontrolled resource consumption so that they can no longer serve client applications.
0