Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Unknown
CVE-2024-33006
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
An unauthenticated attacker can upload a malicious file to the server which when accessed by a victim can allow an attacker to completely compromise system.
1
Attacker Value
Unknown
CVE-2025-24872
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
The ABAP Build Framework in SAP ABAP Platform allows an authenticated attacker to gain unauthorized access to a specific transaction. By executing the add-on build functionality within the ABAP Build Framework, an attacker could call the transaction and view its details. This has a limited impact on the confidentiality of the application with no effect on the integrity and availability of the application.
0
Attacker Value
Unknown
CVE-2025-23190
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
Due to missing authorization check, an authenticated attacker could call a remote-enabled function module which allows them to access data that they would otherwise not have access to. The attacker cannot modify data or impact the availability of the system.
0
Attacker Value
Unknown
CVE-2025-23189
Disclosure Date: February 11, 2025 (last updated February 11, 2025)
Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an authenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability
0
Attacker Value
Unknown
CVE-2025-23187
Disclosure Date: February 11, 2025 (last updated February 12, 2025)
Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an unauthenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability.
0
Attacker Value
Unknown
CVE-2025-0070
Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to obtain illegitimate access to the system by exploiting improper authentication checks, resulting in privilege escalation. On successful exploitation, this can result in potential security concerns. This results in a high impact on confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2025-0066
Disclosure Date: January 14, 2025 (last updated January 14, 2025)
Under certain conditions SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) allows an attacker to access restricted information due to weak access controls. This can have a significant impact on the confidentiality, integrity, and availability of an application
0
Attacker Value
Unknown
CVE-2025-0063
Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP NetWeaver AS ABAP and ABAP Platform does not check for authorization when a user executes some RFC function modules. This could lead to an attacker with basic user privileges to gain control over the data in Informix database, leading to complete compromise of confidentiality, integrity and availability.
0
Attacker Value
Unknown
CVE-2025-0053
Disclosure Date: January 14, 2025 (last updated January 14, 2025)
SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker to gain unauthorized access to system information. By using a specific URL parameter, an unauthenticated attacker could retrieve details such as system configuration. This has a limited impact on the confidentiality of the application and may be leveraged to facilitate further attacks or exploits.
0
Attacker Value
Unknown
CVE-2024-47585
Disclosure Date: December 10, 2024 (last updated December 21, 2024)
SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to gain higher access levels than they should have by exploiting improper authorization checks, resulting in privilege escalation. While authorizations for import and export are distinguished, a single authorization is applied for both, which may contribute to these risks. On successful exploitation, this can result in potential security concerns. However, it has no impact on the integrity and availability of the application and may have only a low impact on data confidentiality.
0