2 results (0.011 seconds)

CVSS: 4.7EPSS: 0%CPEs: 11EXPL: 0

SAP NetWeaver Application Server Java Web Container and HTTP Service (Engine API, from 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; J2EE Engine Server Core 7.11, 7.30, 7.31, 7.40, 7.50) do not sufficiently encode user controlled inputs, resulting in a content spoofing vulnerability when error pages are displayed. Java Web Container y HTTP Service en SAP NetWeaver Application Server (Engine API, de la versión 7.10 a la 7.11, 7.30, 7.31, 7.40, 7.50; J2EE Engine Server Core 7.11, 7.30, 7.31, 7.40 y 7.50) no cifran lo suficiente entradas controladas por el usuario, lo que resulta en una vulnerabilidad de suplantación de contenido cuando se muestran páginas de error. • http://www.securityfocus.com/bid/104130 https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018 https://launchpad.support.sap.com/#/notes/2550202 • CWE-172: Encoding Error •

CVSS: 4.9EPSS: 0%CPEs: 8EXPL: 0

The Telnet interface in the SAP J2EE Engine Core (SAP-JEECOR) 6.40 through 7.02, and Server Core (SERVERCORE) 7.10 through 7.30 allows remote authenticated users to bypass a security check and conduct SMB relay attacks via unspecified vectors. El interfaz Telnet en el SAP J2EE Engine Core (SAP-JEECOR) v6.40 hasta v7.02, y Server Core (SERVERCORE) v7.10 hasta la v7.30 permite a usuarios remotos autenticados evitar una comprobación de seguridad y realizar ataques de retransmisión de SMB a través de vectores sin especificar. • http://archives.neohapsis.com/archives/fulldisclosure/2010-06/0371.html http://secunia.com/advisories/40223 http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2010-005 http://www.securityfocus.com/archive/1/511855/100/0/threaded http://www.securityfocus.com/bid/40916 http://www.securitytracker.com/id?1024114 https://exchange.xforce.ibmcloud.com/vulnerabilities/59502 https://service.sap.com/sap/support/notes/1425847 • CWE-264: Permissions, Privileges, and Access Controls •