cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-0064,https://securityvulnerability.io/vulnerability/CVE-2025-0064,Vulnerability in SAP BusinessObjects Central Management Console Allows User Impersonation,"The Central Management Console of the SAP BusinessObjects Business Intelligence platform presents a vulnerability where an authenticated attacker with administrative privileges can generate or retrieve a secret passphrase. This flaw potentially allows the attacker to impersonate any user within the system, threatening the confidentiality and integrity of user data without affecting system availability. Immediate remediation is advised to prevent unauthorized access.",SAP,SAP Businessobjects Business Intelligence Platform (central Management Console),8.7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T00:33:03.769Z,0 CVE-2022-41203,https://securityvulnerability.io/vulnerability/CVE-2022-41203,Deserialization Vulnerability in SAP BusinessObjects BI Platform,"In specific workflows of the SAP BusinessObjects BI Platform, an authenticated attacker with low privileges may exploit a deserialization vulnerability. By intercepting a serialized object in system parameters and substituting it with a malicious counterpart, the attacker can trigger the deserialization of untrusted data. This exploitation has the potential to significantly undermine the confidentiality, integrity, and availability of system data, which may lead to unauthorized access or manipulation of sensitive information.",SAP,SAP Businessobjects Business Intelligence Platform (central Management Console And Bi LauncHPad),9.9,CRITICAL,0.001019999966956675,false,,false,false,false,,,false,false,,2022-11-08T00:00:00.000Z,0 CVE-2022-35228,https://securityvulnerability.io/vulnerability/CVE-2022-35228,Unauthenticated Token Retrieval Vulnerability in SAP BusinessObjects CMC,"SAP BusinessObjects CMC has a vulnerability that allows unauthenticated attackers to retrieve sensitive token information over the network. This exploitation occurs when a legitimate user is interacting with the application, creating an opportunity for local compromise through methods such as network sniffing or social engineering attacks. If successfully exploited, the attacker gains the ability to completely compromise the SAP BusinessObjects CMC application, posing a significant risk to the security of the system.",SAP,SAP Businessobjects Business Intelligence Platform (central Management Console),8.8,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2022-07-12T20:28:40.000Z,0