7 results (0.004 seconds)

CVSS: 7.3EPSS: 0%CPEs: 9EXPL: 0

SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One on SAP HANA, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behaviour of the application thereby highly impacting the integrity and availability of the application. SAP Business One Hana Chef Cookbook, versiones 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, usados para instalar SAP Business One en SAP HANA, permite a un atacante inyectar código que puede ser ejecutado por la aplicación. De este modo, un atacante podría controlar el comportamiento de la aplicación, impactando altamente a la integridad y disponibilidad de la aplicación • https://launchpad.support.sap.com/#/notes/3049661 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=576094655 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 0

Under certain conditions, SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One for SAP HANA, allows an attacker to exploit an insecure temporary backup path and to access information which would otherwise be restricted, resulting in Information Disclosure vulnerability highly impacting the confidentiality, integrity and availability of the application. Bajo determinadas condiciones, SAP Business One Hana Chef Cookbook, versiones 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, usadas para instalar SAP Business One para SAP HANA, permite a un atacante explotar una ruta de respaldo temporal no segura y acceder a información que de lo contrario, sería restringido, resultando en una vulnerabilidad de Divulgación de Información impactando altamente la confidencialidad, integridad y disponibilidad de la aplicación • https://launchpad.support.sap.com/#/notes/3049661 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=576094655 •

CVSS: 3.3EPSS: 0%CPEs: 2EXPL: 0

Under certain conditions SAP Business One client (B1_ON_HANA, SAP-M-BO), before versions 9.2 and 9.3, allows an attacker to access information which would otherwise be restricted. Bajo ciertas condiciones, el cliente SAP Business One (B1_ON_HANA, SAP-M-BO), versiones anteriores a 9.2 y 9.3, permite a un atacante acceder a información que de otra manera estaría restringida. • https://launchpad.support.sap.com/#/notes/2768864 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

TRACE method is enabled in SAP Business One Service Layer . Attacker can use XST (Cross Site Tracing) attack if frontend applications that are using Service Layer has a XSS vulnerability. This has been fixed in SAP Business One Service Layer (B1_ON_HANA, versions 9.2, 9.3). El método TRACE está habilitado en SAP Business One Service Layer. Un atacante puede emplear un ataque XST (Cross-Site Tracing) si las aplicaciones del frontend que emplean Service Layer tienen una vulnerabilidad Cross-Site Scripting (XSS). • http://www.securityfocus.com/bid/106173 https://launchpad.support.sap.com/#/notes/2680492 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Under certain conditions, Crystal Report using SAP Business One, versions 9.2 and 9.3, connection type allows an attacker to access information which would otherwise be restricted. En ciertas condiciones, en Crystal Report en SAP Business One 9.2 y 9.3, el tipo de conexión permite que un atacante acceda a información que normalmente estaría restringida. • http://www.securityfocus.com/bid/105307 https://launchpad.support.sap.com/#/notes/2670284 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993 •