Page 6 of 79 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

SAP Shared Service Framework does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. On successful exploitation, an attacker can cause a high impact on confidentiality of the application. • https://me.sap.com/notes/3474590 https://url.sap/sapsecuritypatchday • CWE-862: Missing Authorization •

CVSS: 7.4EPSS: 0%CPEs: 2EXPL: 0

Some OCC API endpoints in SAP Commerce Cloud allows Personally Identifiable Information (PII) data, such as passwords, email addresses, mobile numbers, coupon codes, and voucher codes, to be included in the request URL as query or path parameters. On successful exploitation, this could lead to a High impact on confidentiality and integrity of the application. • https://me.sap.com/notes/3459935 https://url.sap/sapsecuritypatchday • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

BEx Web Java Runtime Export Web Service does not sufficiently validate an XML document accepted from an untrusted source. An attacker can retrieve information from the SAP ADS system and exhaust the number of XMLForm service which makes the SAP ADS rendering (PDF creation) unavailable. This affects the confidentiality and availability of the application. • https://me.sap.com/notes/3485284 https://url.sap/sapsecuritypatchday • CWE-91: XML Injection (aka Blind XPath Injection) •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

In SAP BusinessObjects Business Intelligence Platform, if Single Signed On is enabled on Enterprise authentication, an unauthorized user can get a logon token using a REST endpoint. The attacker can fully compromise the system resulting in High impact on confidentiality, integrity and availability. • https://me.sap.com/notes/3479478 https://url.sap/sapsecuritypatchday • CWE-862: Missing Authorization •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

SAP Transportation Management (Collaboration Portal) allows an attacker with non-administrative privileges to send a crafted request from a vulnerable web application. This will trigger the application handler to send a request to an unintended service, which may reveal information about that service. The information obtained could be used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. There is no effect on integrity or availability of the application. SAP Transportation Management (Collaboration Portal) permite a un atacante con privilegios no administrativos enviar una solicitud manipulada desde una aplicación web vulnerable. • https://me.sap.com/notes/3469958 https://url.sap/sapsecuritypatchday • CWE-918: Server-Side Request Forgery (SSRF) •