Show filters
295 Total Results
Displaying 41-50 of 295
Sort by:
Attacker Value
Unknown

CVE-2023-30744

Disclosure Date: May 09, 2023 (last updated October 08, 2023)
In SAP AS NetWeaver JAVA - versions SERVERCORE 7.50, J2EE-FRMW 7.50, CORE-TOOLS 7.50, an unauthenticated attacker can attach to an open interface and make use of an open naming and directory API to instantiate an object which has methods which can be called without further authorization and authentication.  A subsequent call to one of these methods can read or change the state of existing services without any effect on availability.
Attacker Value
Unknown

CVE-2023-30441

Disclosure Date: April 29, 2023 (last updated October 08, 2023)
IBM Runtime Environment, Java Technology Edition IBMJCEPlus and JSSE 8.0.7.0 through 8.0.7.11 components could expose sensitive information using a combination of flaws and configurations. IBM X-Force ID: 253188.
Attacker Value
Unknown

CVE-2023-24527

Disclosure Date: April 11, 2023 (last updated October 08, 2023)
SAP NetWeaver AS Java for Deploy Service - version 7.5, does not perform any access control checks for functionalities that require user identity enabling an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access a service which will enable them to access but not modify server settings and data with no effect on availability and integrity.
Attacker Value
Unknown

CVE-2023-27268

Disclosure Date: March 14, 2023 (last updated October 08, 2023)
SAP NetWeaver AS Java (Object Analyzing Service) - version 7.50, does not perform necessary authorization checks, allowing an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access a service which will enable them to access but not modify server settings and data with no effect on availability., resulting in escalation of privileges.
Attacker Value
Unknown

CVE-2023-26460

Disclosure Date: March 14, 2023 (last updated October 08, 2023)
Cache Management Service in SAP NetWeaver Application Server for Java - version 7.50, does not perform any authentication checks for functionalities that require user identity
Attacker Value
Unknown

CVE-2023-24526

Disclosure Date: March 14, 2023 (last updated October 08, 2023)
SAP NetWeaver Application Server Java for Classload Service - version 7.50, does not perform any authentication checks for functionalities that require user identity, resulting in escalation of privileges. This failure has a low impact on confidentiality of the data such that an unassigned user can read non-sensitive server data.
Attacker Value
Unknown

CVE-2023-23857

Disclosure Date: March 14, 2023 (last updated October 08, 2023)
Due to missing authentication check, SAP NetWeaver AS for Java - version 7.50, allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and services across systems. On a successful exploitation, the attacker can read and modify some sensitive information but can also be used to lock up any element or operation of the system making that it unresponsive or unavailable.
Attacker Value
Unknown

CVE-2023-0017

Disclosure Date: January 10, 2023 (last updated October 08, 2023)
An unauthenticated attacker in SAP NetWeaver AS for Java - version 7.50, due to improper access control, can attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data on the current system. This could allow the attacker to have full read access to user data, make modifications to user data, and make services within the system unavailable.
Attacker Value
Unknown

CVE-2022-41262

Disclosure Date: December 12, 2022 (last updated November 08, 2023)
Due to insufficient input validation, SAP NetWeaver AS Java (HTTP Provider Service) - version 7.50, allows an unauthenticated attacker to inject a script into a web request header. On successful exploitation, an attacker can view or modify information causing a limited impact on the confidentiality and integrity of the application.
Attacker Value
Unknown

CVE-2022-43484

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to a ClassLoader manipulation vulnerability due to using the old version of Spring Framework which contains the vulnerability.The vulnerability is caused by an improper input validation issue in the binding mechanism of Spring MVC. By the application processing a specially crafted file, arbitrary code may be executed with the privileges of the application.