Show filters
1,713 Total Results
Displaying 391-400 of 1,713
Sort by:
Attacker Value
Unknown
CVE-2022-27667
Disclosure Date: April 12, 2022 (last updated February 23, 2025)
Under certain conditions, SAP BusinessObjects Business Intelligence platform, Client Management Console (CMC) - version 430, allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure.
0
Attacker Value
Unknown
CVE-2022-22541
Disclosure Date: April 12, 2022 (last updated February 23, 2025)
SAP BusinessObjects Business Intelligence Platform - versions 420, 430, may allow legitimate users to access information they shouldn't see through relational or OLAP connections. The main impact is the disclosure of company data to people that shouldn't or don't need to have access.
0
Attacker Value
Unknown
CVE-2019-14839
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
It was observed that while login into Business-central console, HTTP request discloses sensitive information like username and password when intercepted using some tool like burp suite etc.
0
Attacker Value
Unknown
CVE-2021-39046
Disclosure Date: March 17, 2022 (last updated February 23, 2025)
IBM Business Automation Workflow 18.0, 19.0, 20.0, and 21.0 and IBM Business Process Manager 8.5 and 8.6 stores user credentials in plain clear text which can be read by a lprivileged user. IBM X-Force ID: 214346.
0
Attacker Value
Unknown
CVE-2022-26143
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.
0
Attacker Value
Unknown
CVE-2022-24398
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
Under certain conditions SAP Business Objects Business Intelligence Platform - versions 420, 430, allows an authenticated attacker to access information which would otherwise be restricted.
0
Attacker Value
Unknown
CVE-2022-24680
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create a mount point and leverage this for arbitrary folder deletion, leading to escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2022-24679
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local attacker to create an writable folder in an arbitrary location and escalate privileges affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2022-24678
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
An security agent resource exhaustion denial-of-service vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow an attacker to flood a temporary log location and consume all disk space on affected installations.
0
Attacker Value
Unknown
CVE-2021-25060
Disclosure Date: February 21, 2022 (last updated February 23, 2025)
The Five Star Business Profile and Schema WordPress plugin before 2.1.7 does not have any authorisation and CSRF in its bpfwp_welcome_add_contact_page and bpfwp_welcome_set_contact_information AJAX action, allowing any authenticated users, such as subscribers, to call them. Furthermore, due to the lack of sanitisation, it also lead to Stored Cross-Site Scripting issues
0