Show filters
1,715 Total Results
Displaying 111-120 of 1,715
Sort by:
Attacker Value
Unknown

CVE-2024-39599

Disclosure Date: July 09, 2024 (last updated July 09, 2024)
Due to a Protection Mechanism Failure in SAP NetWeaver Application Server for ABAP and ABAP Platform, a developer can bypass the configured malware scanner API because of a programming error. This leads to a low impact on the application's confidentiality, integrity, and availability.
0
Attacker Value
Unknown

CVE-2024-39596

Disclosure Date: July 09, 2024 (last updated July 09, 2024)
Due to missing authorization checks, SAP Enable Now allows an author to escalate privileges to access information which should otherwise be restricted. On successful exploitation, the attacker can cause limited impact on confidentiality of the application.
0
Attacker Value
Unknown

CVE-2024-39595

Disclosure Date: July 09, 2024 (last updated July 09, 2024)
SAP Business Warehouse - Business Planning and Simulation application does not sufficiently encode user-controlled inputs, resulting in Stored Cross-Site Scripting (XSS) vulnerability. This vulnerability allows users to modify website content and on successful exploitation, an attacker can cause low impact to the confidentiality and integrity of the application.
0
Attacker Value
Unknown

CVE-2024-39594

Disclosure Date: July 09, 2024 (last updated July 09, 2024)
SAP Business Warehouse - Business Planning and Simulation application does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker can cause low impact on the confidentiality and integrity of the application.
0
Attacker Value
Unknown

CVE-2024-37180

Disclosure Date: July 09, 2024 (last updated July 09, 2024)
Under certain conditions SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker to access remote-enabled function module with no further authorization which would otherwise be restricted, the function can be used to read non-sensitive information with low impact on confidentiality of the application.
0
Attacker Value
Unknown

CVE-2024-37175

Disclosure Date: July 09, 2024 (last updated September 10, 2024)
SAP CRM WebClient does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to access some sensitive information.
Attacker Value
Unknown

CVE-2024-37172

Disclosure Date: July 09, 2024 (last updated September 10, 2024)
SAP S/4HANA Finance (Advanced Payment Management) does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. As a result, it has a low impact to confidentiality and availability but there is no impact on the integrity.
Attacker Value
Unknown

CVE-2024-37171

Disclosure Date: July 09, 2024 (last updated September 10, 2024)
SAP Transportation Management (Collaboration Portal) allows an attacker with non-administrative privileges to send a crafted request from a vulnerable web application. This will trigger the application handler to send a request to an unintended service, which may reveal information about that service. The information obtained could be used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. There is no effect on integrity or availability of the application.
Attacker Value
Unknown

CVE-2024-34692

Disclosure Date: July 09, 2024 (last updated September 10, 2024)
Due to missing verification of file type or content, SAP Enable Now allows an authenticated attacker to upload arbitrary files. These files include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker can cause limited impact on confidentiality and Integrity of the application.
Attacker Value
Unknown

CVE-2024-34689

Disclosure Date: July 09, 2024 (last updated September 10, 2024)
WebFlow Services of SAP Business Workflow allows an authenticated attacker to enumerate accessible HTTP endpoints in the internal network by specially crafting HTTP requests. On successful exploitation this can result in information disclosure. It has no impact on integrity and availability of the application.