Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Update 1 to Security Note 1653474, SAP security note 1724922

Description

Update 21-07-2016 : This note has been re-released after adding the required validity. The update contains no new corrections.

Security note 1653474 has been rereleased due to missing Support Package patch level entries. Newly-added Support Package patch level entries are listed in the SP Patch level:

Available fix and Supported packages

  • SAP_JTECHS | 6.40 | 6.40
  • SAP_JTECHS | 7.00 | 7.02
  • SAP_JTECHF | 7.00 | 7.02
  • SAP_JTECHF | 6.40 | 6.40
  • SAP J2EE ENGINE 6.40 | SP030 | 000000
  • SAP JAVA TECH SERVICES 7.00 | SP023 | 000020
  • SAP JAVA TECH SERVICES 7.00 | SP024 | 000013
  • SAP TECH S 7.00 OFFLINE | SP025 | 000014
  • SAP TECH S OFFLINE 7.02 | SP005 | 000012
  • SAP TECH S OFFLINE 7.02 | SP006 | 000011
  • SAP TECH S OFFLINE 7.02 | SP007 | 000011
  • SAP TECH S OFFLINE 7.02 | SP008 | 000011
  • SAP TECH S OFFLINE 7.02 | SP009 | 000013
  • SAP TECH S OFFLINE 7.02 | SP010 | 000008

Affected component

    BC-WD-JAV
    WebDynpro Java

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1724922

TAGS

#Reflected-cross-site-scripting
#XSS
#Web-Dynpro-Java
#update
#update-note

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,