CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-42994

Description: SAP MDM Server ReadString function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail and exit unexpectedly causing high impact on availability with no impact on confidentiality and integrity of the application.

CVSS: HIGH (7.5)

EPSS Score: 0.03%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42993

Description: Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the attacker to consume events via the RFC destination, leading to code execution under the privileges of the assigned high-privilege user. While the vulnerability has a low impact on Availability, it significantly poses a high risk to both Confidentiality and Integrity.

CVSS: MEDIUM (6.7)

EPSS Score: 0.06%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42991

Description: SAP S/4HANA (Bank Account Application) does not perform necessary authorization checks. This allows an authenticated 'approver' user to delete attachment from bank account application of other user, leading to a low impact on integrity, with no impact on the confidentiality of the data or the availability of the application.

CVSS: MEDIUM (4.3)

EPSS Score: 0.03%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42990

Description: Unprotected SAPUI5 applications allow an attacker with basic privileges to inject malicious HTML code into a webpage, with the goal of redirecting users to the attacker controlled URL. This issue could impact the integrity of the application. Confidentiality or Availability are not impacted.

CVSS: LOW (3.0)

EPSS Score: 0.03%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42989

Description: RFC inbound processing�does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation the attacker could critically impact both integrity and availability of the application.

CVSS: CRITICAL (9.6)

EPSS Score: 0.04%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42988

Description: Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable the researcher to cause SSRF. It has no impact on integrity and availability of the application.

CVSS: LOW (3.7)

EPSS Score: 0.04%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42987

Description: SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit shared rules of any user by tampering the request parameter. Due to missing authorization check, the attacker can edit rules that should be restricted, compromising the integrity of the application.

CVSS: MEDIUM (4.3)

EPSS Score: 0.03%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42984

Description: SAP S/4HANA Manage Central Purchase Contract does not perform necessary authorization checks for an authenticated user. Due to this, an attacker could execute the function import on the entity making it inaccessible for unrestricted user. This has low impact on confidentiality and availability of the application.

CVSS: MEDIUM (5.4)

EPSS Score: 0.03%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42983

Description: SAP Business Warehouse and SAP Plug-In Basis allows an authenticated attacker to drop arbitrary SAP database tables, potentially resulting in a loss of data or rendering the system unusable. On successful exploitation, an attacker can completely delete database entries but is not able to read any data.

CVSS: HIGH (8.5)

EPSS Score: 0.04%

Source: CVE
June 10th, 2025 (4 days ago)

CVE-2025-42982

Description: SAP GRC allows a non-administrative user to access and initiate transaction which could allow them to modify or control the transmitted system credentials. This causes high impact on confidentiality, integrity and availability of the application.

CVSS: HIGH (8.8)

EPSS Score: 0.04%

Source: CVE
June 10th, 2025 (4 days ago)