Page 57 of 11284 results (0.101 seconds)

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

SAP NetWeaver AS for Java allows an authorized attacker to obtain sensitive information. ... After successful exploitation, an attacker can read the sensitive information but cannot modify or delete the data. • https://me.sap.com/notes/3477359 https://url.sap/sapsecuritypatchday • CWE-256: Plaintext Storage of a Password •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Under certain conditions Statutory Reports in SAP S/4 HANA allows an attacker with basic privileges to access information which would otherwise be restricted. • https://me.sap.com/notes/3437585 https://url.sap/sapsecuritypatchday • CWE-213: Exposure of Sensitive Information Due to Incompatible Policies •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

Due to missing authorization checks, SAP Business Warehouse (BEx Analyzer) allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a limited impact on confidentiality of the application. • https://me.sap.com/notes/3481992 https://url.sap/sapsecuritypatchday • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor CWE-862: Missing Authorization •

CVSS: 4.3EPSS: 0%CPEs: -EXPL: 0

Due to missing authorization checks, SAP BEx Analyzer allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a limited impact on confidentiality of the application. • https://me.sap.com/notes/3481588 https://url.sap/sapsecuritypatchday • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor CWE-862: Missing Authorization •

CVSS: 5.9EPSS: 0%CPEs: -EXPL: 0

IBM Maximo Application Suite - Manage Component 8.10, 8.11, and 9.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM Maximo Application Suite - Manage Component 8.10, 8.11, and 9.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information using man in the middle techniques. • https://exchange.xforce.ibmcloud.com/vulnerabilities/292799 https://www.ibm.com/support/pages/node/7167725 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •