Page(s) : 1 ... 68 69 70 71 72 73 74 75 76 77 [78] 79 80 81 82 83 84 85 86 87 88 ... | Result(s) : 324225 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
N/A | 2025-06-10 | CVE-2025-5904 | cve | A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setWiFiMeshName of the file /cgi-bin/cst... |
N/A | 2025-06-10 | CVE-2025-5905 | cve | A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been rated as critical. Affected by this issue is the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi... |
8.2 | 2025-06-10 | CVE-2025-23192 | cve | SAP BusinessObjects Business Intelligence (BI Workspace) allows an unauthenticated attacker to craft and store malicious script within a workspace. When the victim accesses the ... |
5.8 | 2025-06-10 | CVE-2025-31325 | cve | Due to a Cross-Site Scripting vulnerability in SAP NetWeaver (ABAP Keyword Documentation), an unauthenticated attacker could inject malicious JavaScript into a web page through ... |
7.6 | 2025-06-10 | CVE-2025-42977 | cve | SAP NetWeaver Visual Composer contains a Directory Traversal vulnerability caused by insufficient validation of input paths provided by a high-privileged user. This allows an at... |
8.8 | 2025-06-10 | CVE-2025-42982 | cve | SAP GRC allows a non-administrative user to access and initiate transaction which could allow them to modify or control the transmitted system credentials. This causes high impa... |
8.5 | 2025-06-10 | CVE-2025-42983 | cve | SAP Business Warehouse and SAP Plug-In Basis allows an authenticated attacker to drop arbitrary SAP database tables, potentially resulting in a loss of data or rendering the sys... |
5.4 | 2025-06-10 | CVE-2025-42984 | cve | SAP S/4HANA Manage Central Purchase Contract does not perform necessary authorization checks for an authenticated user. Due to this, an attacker could execute the function impor... |
4.3 | 2025-06-10 | CVE-2025-42987 | cve | SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit shared rules of any user by tampering the request parameter. Due to missing aut... |
3.7 | 2025-06-10 | CVE-2025-42988 | cve | Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially... |
9.6 | 2025-06-10 | CVE-2025-42989 | cve | RFC inbound processing?does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation the attacker ... |
3 | 2025-06-10 | CVE-2025-42990 | cve | Unprotected SAPUI5 applications allow an attacker with basic privileges to inject malicious HTML code into a webpage, with the goal of redirecting users to the attacker controll... |
4.3 | 2025-06-10 | CVE-2025-42991 | cve | SAP S/4HANA (Bank Account Application) does not perform necessary authorization checks. This allows an authenticated 'approver' user to delete attachment from bank acc... |
6.7 | 2025-06-10 | CVE-2025-42993 | cve | Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC... |
7.5 | 2025-06-10 | CVE-2025-42994 | cve | SAP MDM Server ReadString function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then ... |
7.5 | 2025-06-10 | CVE-2025-42995 | cve | SAP MDM Server Read function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail a... |
5.6 | 2025-06-10 | CVE-2025-42996 | cve | SAP MDM Server allows an attacker to gain control of existing client sessions and execute certain functions without having to re-authenticate giving the ability to access or mod... |
5.3 | 2025-06-10 | CVE-2025-42998 | cve | The security settings in the SAP Business One Integration Framework are not adequately checked, allowing attackers to bypass the 403 Forbidden error and access restricted pages.... |
9.8 | 2025-06-10 | CVE-2025-5906 | cve | A vulnerability classified as critical has been found in code-projects Laundry System 1.0. This affects an unknown part of the file /data/. The manipulation leads to missing aut... |
N/A | 2025-06-10 | CVE-2025-5907 | cve | A vulnerability classified as critical was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This vulnerability affects unknown code of the file /boafrm/formFilter of the ... |
Page(s) : 1 ... 68 69 70 71 72 73 74 75 76 77 [78] 79 80 81 82 83 84 85 86 87 88 ... | Result(s) : 324225 |