Lucene search

K

Business Planning And Consolidation Security Vulnerabilities

cve
cve

CVE-2017-16349

An exploitable XML external entity vulnerability exists in the reporting functionality of SAP BPC. A specially crafted XML request can cause an XML external entity to be referenced, resulting in information disclosure and potential denial of service. An attacker can issue authenticated HTTP request...

8.1CVSS

7.6AI Score

0.001EPSS

2018-08-02 07:29 PM
43
cve
cve

CVE-2020-6368

SAP Business Planning and Consolidation, versions - 750, 751, 752, 753, 754, 755, 810, 100, 200, can be abused by an attacker, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users, leading to Cr...

5.4CVSS

5.5AI Score

0.001EPSS

2020-10-15 02:15 AM
39
cve
cve

CVE-2022-41268

In some SAP standard roles in SAP Business Planning and Consolidation - versions - SAP_BW 750, 751, 752, 753, 754, 755, 756, 757, DWCORE 200, 300, CPMBPC 810, a transaction code reserved for the customer is used. By implementing such transaction code, a malicious user may execute unauthorized trans...

8.5CVSS

7.6AI Score

0.001EPSS

2022-12-13 03:15 AM
23
cve
cve

CVE-2023-0016

SAP BPC MS 10.0 - version 810, allows an unauthorized attacker to execute crafted database queries. The exploitation of this issue could lead to SQL injection vulnerability and could allow an attacker to access, modify, and/or delete data from the backend database.

9.9CVSS

8.9AI Score

0.001EPSS

2023-01-10 04:15 AM
35
cve
cve

CVE-2023-23851

SAP Business Planning and Consolidation - versions 200, 300, allows an attacker with business authorization to upload any files (including web pages) without the proper file format validation. If other users visit the uploaded malicious web page, the attacker may perform actions on behalf of the us...

5.4CVSS

5.5AI Score

0.001EPSS

2023-02-14 04:15 AM
23
cve
cve

CVE-2023-31407

SAP Business Planning and Consolidation - versions 740, 750, allows an authorized attacker to upload a malicious file, resulting in Cross-Site Scripting vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.

5.4CVSS

5.3AI Score

0.001EPSS

2023-05-09 02:15 AM
29