Latest CVE Feed
-
8.2
HIGHCVE-2022-22554
Dell EMC System Update, version 1.9.2 and prior, contain an Unprotected Storage of Credentials vulnerability. A local attacker with user privleges could potentially exploit this vulnerability leading to the disclosure of user passwords.... Read more
Affected Products : emc_system_update- Published: Jan. 24, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2022-22553
Dell EMC AppSync versions 3.9 to 4.3 contain an Improper Restriction of Excessive Authentication Attempts Vulnerability that can be exploited from UI and CLI. An adjacent unauthenticated attacker could potentially exploit this vulnerability, leading to pa... Read more
- Published: Jan. 21, 2022
- Modified: Nov. 21, 2024
-
6.9
MEDIUMCVE-2022-22552
Dell EMC AppSync versions 3.9 to 4.3 contain a clickjacking vulnerability in AppSync. A remote unauthenticated attacker could potentially exploit this vulnerability to trick the victim into executing state changing operations.... Read more
- Published: Jan. 21, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2022-22551
DELL EMC AppSync versions 3.9 to 4.3 use GET request method with sensitive query strings. An Adjacent, unauthenticated attacker could potentially exploit this vulnerability, and hijack the victim session.... Read more
- Published: Jan. 21, 2022
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2022-22550
Dell PowerScale OneFS, versions 8.2.2 and above, contain a password disclosure vulnerability. An unprivileged local attacker could potentially exploit this vulnerability, leading to account take over.... Read more
- Published: Apr. 12, 2022
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2022-22549
Dell PowerScale OneFS, 8.2.x-9.3.x, contains a Improper Certificate Validation. A unauthenticated remote attacker could potentially exploit this vulnerability, leading to a man-in-the-middle capture of administrative credentials.... Read more
- Published: Apr. 12, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2022-22547
Simple Diagnostics Agent - versions 1.0 (up to version 1.57.), allows an attacker to access information which would otherwise be restricted via a random port 9000-65535. This allows information gathering which could be used exploit future open-source secu... Read more
Affected Products : simple_diagnostics_agent- Published: Mar. 10, 2022
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2022-22546
Due to improper HTML encoding in input control summary, an authorized attacker can execute XSS vulnerability in SAP Business Objects Web Intelligence (BI Launchpad) - version 420.... Read more
Affected Products : businessobjects_web_intelligence- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2022-22545
A high privileged user who has access to transaction SM59 can read connection details stored with the destination for http calls in SAP NetWeaver Application Server ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 7... Read more
- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2022-22544
Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered ... Read more
Affected Products : solution_manager- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2022-22543
SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT, 7.49, does not sufficiently validate s... Read more
- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-22542
S/4HANA Supplier Factsheet exposes the private address and bank details of an Employee Business Partner with Supplier Role, AND Enterprise Search for Customer, Supplier and Business Partner objects exposes the private address fields of Employee Business P... Read more
Affected Products : s\/4hana- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-22541
SAP BusinessObjects Business Intelligence Platform - versions 420, 430, may allow legitimate users to access information they shouldn't see through relational or OLAP connections. The main impact is the disclosure of company data to people that shouldn't ... Read more
Affected Products : businessobjects_business_intelligence_platform- Published: Apr. 12, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2022-22540
SAP NetWeaver AS ABAP (Workplace Server) - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 787, allows an attacker to execute crafted database queries, that could expose the backend database. Successful attacks could result in disclos... Read more
Affected Products : netweaver_application_server_abap- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-22539
When a user opens a manipulated JPEG file format (.jpg, 2d.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The... Read more
Affected Products : 3d_visual_enterprise_viewer- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-22538
When a user opens a manipulated Adobe Illustrator file format (.ai, ai.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the appl... Read more
Affected Products : 3d_visual_enterprise_viewer- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-22537
When a user opens a manipulated Tagged Image File Format (.tiff, 2d.x3d)) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the applic... Read more
Affected Products : 3d_visual_enterprise_viewer- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2022-22535
SAP ERP HCM Portugal - versions 600, 604, 608, does not perform necessary authorization checks for a report that reads the payroll data of employees in a certain area. Since the affected report only reads the payroll information, the attacker can neither ... Read more
- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2022-22534
Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can par... Read more
Affected Products : netweaver- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2022-22533
Due to improper error handling in SAP NetWeaver Application Server Java - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, an attacker could submit multiple HTTP server requests resulting in errors, suc... Read more
Affected Products : netweaver_application_server_java- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024