Логотип exploitDog
bind:CVE-2025-42965
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-42965

Количество 3

Количество 3

nvd логотип

CVE-2025-42965

7 месяцев назад

SAP CMC Promotion Management allows an authenticated attacker to enumerate internal network systems by submitting crafted requests during job source configuration. By analysing response times for various IP addresses and ports, the attacker can infer valid network endpoints. Successful exploitation may lead to information disclosure. This vulnerability does not impact the integrity or availability of the application.

CVSS3: 4.1
EPSS: Низкий
github логотип

GHSA-3gwq-rj9c-4f42

7 месяцев назад

SAP CMC Promotion Management allows an authenticated attacker to enumerate internal network systems by submitting crafted requests during job source configuration. By analysing response times for various IP addresses and ports, the attacker can infer valid network endpoints. Successful exploitation may lead to information disclosure. This vulnerability does not impact the integrity or availability of the application.

CVSS3: 4.1
EPSS: Низкий
fstec логотип

BDU:2025-10653

7 месяцев назад

Уязвимость веб-инструмента для выполнения задач администрирования SAP BusinessObjects BI Platform Central Management Console, связанная c подделкой запросов на стороне сервера, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 4.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-42965

SAP CMC Promotion Management allows an authenticated attacker to enumerate internal network systems by submitting crafted requests during job source configuration. By analysing response times for various IP addresses and ports, the attacker can infer valid network endpoints. Successful exploitation may lead to information disclosure. This vulnerability does not impact the integrity or availability of the application.

CVSS3: 4.1
0%
Низкий
7 месяцев назад
github логотип
GHSA-3gwq-rj9c-4f42

SAP CMC Promotion Management allows an authenticated attacker to enumerate internal network systems by submitting crafted requests during job source configuration. By analysing response times for various IP addresses and ports, the attacker can infer valid network endpoints. Successful exploitation may lead to information disclosure. This vulnerability does not impact the integrity or availability of the application.

CVSS3: 4.1
0%
Низкий
7 месяцев назад
fstec логотип
BDU:2025-10653

Уязвимость веб-инструмента для выполнения задач администрирования SAP BusinessObjects BI Platform Central Management Console, связанная c подделкой запросов на стороне сервера, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 4.1
0%
Низкий
7 месяцев назад

Уязвимостей на страницу