Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-44448 | SAP Biller Direct allows an unauthenticated attacker to craft a legitimate looking URL. When clicked by an unsuspecting victim, it will use an unsensitized parameter to redirect the victim to a malicious site of the attacker's choosing which can result in disclosure or modification of the victim's information. |
Thu, 01 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2025-05-01T14:49:50.788Z
Reserved: 2022-09-21T00:00:00.000Z
Link: CVE-2022-41207
Updated: 2024-08-03T12:35:49.563Z
Status : Modified
Published: 2022-11-08T22:15:17.997
Modified: 2024-11-21T07:22:49.737
Link: CVE-2022-41207
No data.
OpenCVE Enrichment
No data.
EUVD