Lucene search

K
SapEnable Now

5 matches found

CVE
CVE
added 2020/03/10 9:15 p.m.70 views

CVE-2020-6178

SAP Enable Now, before version 1911, sends the Session ID cookie value in URL. This might be stolen from the browser history or log files, leading to Information Disclosure.

5.5CVSS5.4AI score0.00092EPSS
CVE
CVE
added 2019/08/14 2:15 p.m.49 views

CVE-2019-0340

The XML parser, which is being used by SAP Enable Now, before version 1902, has not been hardened correctly, leading to Missing XML Validation vulnerability. This issue affects the file upload at multiple locations. An attacker can read local XXE files.

5.5CVSS5.4AI score0.00126EPSS
CVE
CVE
added 2022/10/11 9:15 p.m.47 views

CVE-2022-35297

The application SAP Enable Now does not sufficiently encode user-controlled inputs over the network before it is placed in the output being served to other users, thereby expanding the attack scope, resulting in Stored Cross-Site Scripting (XSS) vulnerability leading to limited impact on Confidenti...

5.4CVSS5.3AI score0.00831EPSS
CVE
CVE
added 2021/06/09 2:15 p.m.32 views

CVE-2021-27637

Under certain conditions SAP Enable Now (SAP Workforce Performance Builder - Manager), versions - 1.0, 10 allows an attacker to access information which would otherwise be restricted leading to information disclosure.

5.9CVSS4.4AI score0.00055EPSS
CVE
CVE
added 2023/07/11 3:15 a.m.25 views

CVE-2023-36919

In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure.

5.3CVSS5AI score0.00277EPSS