
CVE-2024-22128 – Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Business Client for HTML
https://notcve.org/view.php?id=CVE-2024-22128
13 Feb 2024 — SAP NWBC for HTML - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An unauthenticated attacker can inject malicious javascript to cause limited impact to confidentiality and integrity of the application data after successful exploitation. SAP NWBC para HTML: versiones SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_U... • https://me.sap.com/notes/3396109 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-38150
https://notcve.org/view.php?id=CVE-2021-38150
14 Sep 2021 — When an attacker manages to get access to the local memory, or the memory dump of a victim, for example by a social engineering attack, SAP Business Client versions - 7.0, 7.70, will allow him to read extremely sensitive data, such as credentials. This would allow the attacker to compromise the corresponding backend for which the credentials are valid. Cuando un atacante consigue acceder a la memoria local, o al volcado de memoria de una víctima, por ejemplo mediante un ataque de ingeniería social, SAP Busi... • https://launchpad.support.sap.com/#/notes/3060621 • CWE-312: Cleartext Storage of Sensitive Information •

CVE-2020-6244
https://notcve.org/view.php?id=CVE-2020-6244
12 May 2020 — SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application. SAP Business Client, versión 7.0, permite a un atacante, después de un ataque exitoso de ingeniería social, inyectar código malicioso ya que un archivo DLL en directorios no confiables puede ser ejecut... • https://launchpad.support.sap.com/#/notes/2911801 • CWE-427: Uncontrolled Search Path Element •

CVE-2020-6228
https://notcve.org/view.php?id=CVE-2020-6228
14 Apr 2020 — SAP Business Client, versions 6.5, 7.0, does not perform necessary integrity checks which could be exploited by an attacker under certain conditions to modify the installer. SAP Business Client, versiones 6.5, 7.0, no lleva a cabo las comprobaciones de integridad necesarias que podrían ser explotadas por un atacante bajo determinadas condiciones para modificar el instalador. • https://launchpad.support.sap.com/#/notes/2866752 • CWE-354: Improper Validation of Integrity Check Value •

CVE-2019-0353
https://notcve.org/view.php?id=CVE-2019-0353
10 Sep 2019 — Under certain conditions SAP Business One client (B1_ON_HANA, SAP-M-BO), before versions 9.2 and 9.3, allows an attacker to access information which would otherwise be restricted. Bajo ciertas condiciones, el cliente SAP Business One (B1_ON_HANA, SAP-M-BO), versiones anteriores a 9.2 y 9.3, permite a un atacante acceder a información que de otra manera estaría restringida. • https://launchpad.support.sap.com/#/notes/2768864 •

CVE-2018-2398
https://notcve.org/view.php?id=CVE-2018-2398
14 Mar 2018 — Under certain conditions SAP Business Client 6.5 allows an attacker to access information which would otherwise be restricted. En ciertas condiciones, SAP Business Client 6.5 permite que un atacante acceda a información que normalmente estaría restringida. • http://www.securityfocus.com/bid/103370 •

CVE-2014-9569
https://notcve.org/view.php?id=CVE-2014-9569
07 Jan 2015 — Multiple cross-site scripting (XSS) vulnerabilities in SAP NetWeaver Business Client (NWBC) for HTML 3.0 allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) roundtrips parameter, aka SAP Security Note 2051285. Múltiples vulnerabilidades de XSS en SAP NetWeaver Business Client (NWBC) para HTML 3.0 permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro (1) title o (2) roundtrips, también conocido como SAP Security Note 2051... • http://secunia.com/advisories/62017 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2014-4160
https://notcve.org/view.php?id=CVE-2014-4160
13 Jun 2014 — Multiple cross-site scripting (XSS) vulnerabilities in the testcanvas node in SAP NetWeaver Business Client (NWBC) allow remote attackers to inject arbitrary web script or HTML via the (1) title or (2) sap-accessibility parameter. Múltiples vulnerabilidades de XSS en el nodo testcanvas en SAP NetWeaver Business Client (NWBC) permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro (1) title o (2) sap-accessibility. • http://blog.emaze.net/2014/05/sap-multiple-vulnerabilities.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2010-4556
https://notcve.org/view.php?id=CVE-2010-4556
17 Dec 2010 — Stack-based buffer overflow in the SapThemeRepository ActiveX control (sapwdpcd.dll) in SAP NetWeaver Business Client allows remote attackers to execute arbitrary code via the (1) Load and (2) LoadTheme methods. Desbordamiento de búfer basado en pila en el control ActiveX SapThemeRepository (sapwdpcd.dll) en SAP NetWeaver Business Client, permite a atacantes remotos ejecutar código arbitrario a través de de los métodos (1) Load y (2) LoadTheme. • http://secunia.com/advisories/35796 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •