cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-22128,https://securityvulnerability.io/vulnerability/CVE-2024-22128,SAP NWBC for HTML Vulnerable to Cross-Site Scripting (XSS) Attacks,"SAP NWBC for HTML - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. An unauthenticated attacker can inject malicious javascript to cause limited impact to confidentiality and integrity of the application data after successful exploitation. ",SAP,SAP NetWeaver Business Client for HTML,6.1,MEDIUM,0.0005000000237487257,false,false,false,false,,false,false,2024-02-13T02:02:14.281Z,0 CVE-2021-38150,https://securityvulnerability.io/vulnerability/CVE-2021-38150,,"When an attacker manages to get access to the local memory, or the memory dump of a victim, for example by a social engineering attack, SAP Business Client versions - 7.0, 7.70, will allow him to read extremely sensitive data, such as credentials. This would allow the attacker to compromise the corresponding backend for which the credentials are valid.",SAP,SAP Business Client,6.5,MEDIUM,0.0016599999507889152,false,false,false,false,,false,false,2021-09-14T11:14:59.000Z,0 CVE-2020-6244,https://securityvulnerability.io/vulnerability/CVE-2020-6244,,"SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application.",SAP,SAP Business Client,7,HIGH,0.000699999975040555,false,false,false,false,,false,false,2020-05-12T17:54:36.000Z,0 CVE-2020-6228,https://securityvulnerability.io/vulnerability/CVE-2020-6228,,"SAP Business Client, versions 6.5, 7.0, does not perform necessary integrity checks which could be exploited by an attacker under certain conditions to modify the installer.",SAP,SAP Business Client,5.3,MEDIUM,0.0008999999845400453,false,false,false,false,,false,false,2020-04-14T18:32:25.000Z,0 CVE-2019-0353,https://securityvulnerability.io/vulnerability/CVE-2019-0353,,"Under certain conditions SAP Business One client (B1_ON_HANA, SAP-M-BO), before versions 9.2 and 9.3, allows an attacker to access information which would otherwise be restricted.",SAP,SAP Business One Client,3.3,LOW,0.0004400000034365803,false,false,false,false,,false,false,2019-09-10T16:05:23.000Z,0 CVE-2018-2398,https://securityvulnerability.io/vulnerability/CVE-2018-2398,,Under certain conditions SAP Business Client 6.5 allows an attacker to access information which would otherwise be restricted.,SAP,SAP Business Client,6.7,MEDIUM,0.0015699999639764428,false,false,false,false,,false,false,2018-03-14T19:00:00.000Z,0