9 results (0.013 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

13 Feb 2024 — SAP NWBC for HTML - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An unauthenticated attacker can inject malicious javascript to cause limited impact to confidentiality and integrity of the application data after successful exploitation. SAP NWBC para HTML: versiones SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_U... • https://me.sap.com/notes/3396109 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

14 Sep 2021 — When an attacker manages to get access to the local memory, or the memory dump of a victim, for example by a social engineering attack, SAP Business Client versions - 7.0, 7.70, will allow him to read extremely sensitive data, such as credentials. This would allow the attacker to compromise the corresponding backend for which the credentials are valid. Cuando un atacante consigue acceder a la memoria local, o al volcado de memoria de una víctima, por ejemplo mediante un ataque de ingeniería social, SAP Busi... • https://launchpad.support.sap.com/#/notes/3060621 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 May 2020 — SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application. SAP Business Client, versión 7.0, permite a un atacante, después de un ataque exitoso de ingeniería social, inyectar código malicioso ya que un archivo DLL en directorios no confiables puede ser ejecut... • https://launchpad.support.sap.com/#/notes/2911801 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

14 Apr 2020 — SAP Business Client, versions 6.5, 7.0, does not perform necessary integrity checks which could be exploited by an attacker under certain conditions to modify the installer. SAP Business Client, versiones 6.5, 7.0, no lleva a cabo las comprobaciones de integridad necesarias que podrían ser explotadas por un atacante bajo determinadas condiciones para modificar el instalador. • https://launchpad.support.sap.com/#/notes/2866752 • CWE-354: Improper Validation of Integrity Check Value •

CVSS: 3.3EPSS: 0%CPEs: 2EXPL: 0

10 Sep 2019 — Under certain conditions SAP Business One client (B1_ON_HANA, SAP-M-BO), before versions 9.2 and 9.3, allows an attacker to access information which would otherwise be restricted. Bajo ciertas condiciones, el cliente SAP Business One (B1_ON_HANA, SAP-M-BO), versiones anteriores a 9.2 y 9.3, permite a un atacante acceder a información que de otra manera estaría restringida. • https://launchpad.support.sap.com/#/notes/2768864 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

14 Mar 2018 — Under certain conditions SAP Business Client 6.5 allows an attacker to access information which would otherwise be restricted. En ciertas condiciones, SAP Business Client 6.5 permite que un atacante acceda a información que normalmente estaría restringida. • http://www.securityfocus.com/bid/103370 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

07 Jan 2015 — Multiple cross-site scripting (XSS) vulnerabilities in SAP NetWeaver Business Client (NWBC) for HTML 3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) roundtrips parameter, aka SAP Security Note 2051285. Múltiples vulnerabilidades de XSS en SAP NetWeaver Business Client (NWBC) para HTML 3.0 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro (1) title o (2) roundtrips, también conocido como SAP Security Note 2051... • http://secunia.com/advisories/62017 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

13 Jun 2014 — Multiple cross-site scripting (XSS) vulnerabilities in the testcanvas node in SAP NetWeaver Business Client (NWBC) allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) sap-accessibility parameter. Múltiples vulnerabilidades de XSS en el nodo testcanvas en SAP NetWeaver Business Client (NWBC) permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro (1) title o (2) sap-accessibility. • http://blog.emaze.net/2014/05/sap-multiple-vulnerabilities.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 16%CPEs: 1EXPL: 0

17 Dec 2010 — Stack-based buffer overflow in the SapThemeRepository ActiveX control (sapwdpcd.dll) in SAP NetWeaver Business Client allows remote attackers to execute arbitrary code via the (1) Load and (2) LoadTheme methods. Desbordamiento de búfer basado en pila en el control ActiveX SapThemeRepository (sapwdpcd.dll) en SAP NetWeaver Business Client, permite a atacantes remotos ejecutar código arbitrario a través de de los métodos (1) Load y (2) LoadTheme. • http://secunia.com/advisories/35796 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •