NA - CVE-2025-1828 - Crypt::Random Perl package 1.05 through 1.55...
Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions. Crypt::Random::rand 1.05 through 1.55 uses the rand()...
Medium - CVE-2024-22340 - IBM Common Cryptographic Architecture 7.0.0...
IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow a remote attacker to obtain sensitive information during the creation of ECDSA signatures to perform a timing-based attack.
Low - CVE-2024-41760 - IBM Common Cryptographic Architecture 7.0.0...
IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow an attacker to obtain sensitive information due to a timing attack during certain RSA operations.
Medium - CVE-2024-49823 - IBM Common Cryptographic Architecture 7.0.0...
IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow an authenticated user to cause a denial of service in the Hardware Security Module (HSM) using a specially crafted sequence of...
Medium - CVE-2025-0062 - SAP BusinessObjects Business Intelligence...
SAP BusinessObjects Business Intelligence Platform allows an attacker to inject JavaScript code in Web Intelligence reports. This code is then executed in the victim's browser each time the...
Medium - CVE-2025-0071 - SAP Web Dispatcher and Internet Communication...
SAP Web Dispatcher and Internet Communication Manager allow an attacker with administrative privileges to enable debugging trace mode with a specific parameter value. This exposes unencrypted...
Medium - CVE-2025-23185 - Due to improper error handling in SAP Business...
Due to improper error handling in SAP Business Objects Business Intelligence Platform, technical details of the application are revealed in exceptions thrown to the user and in stack traces. Only...
Medium - CVE-2025-23188 - An authenticated user with low privileges can...
An authenticated user with low privileges can exploit a missing authorization check in an IBS module of FS-RBD, allowing unauthorized access to perform actions beyond their intended permissions....