Show filters
1,715 Total Results
Displaying 111-120 of 1,715
Sort by:
Attacker Value
Unknown
CVE-2024-39599
Disclosure Date: July 09, 2024 (last updated July 09, 2024)
Due to a Protection Mechanism Failure in SAP
NetWeaver Application Server for ABAP and ABAP Platform, a developer can bypass
the configured malware scanner API because of a programming error. This leads
to a low impact on the application's confidentiality, integrity, and
availability.
0
Attacker Value
Unknown
CVE-2024-39596
Disclosure Date: July 09, 2024 (last updated July 09, 2024)
Due to missing authorization checks, SAP Enable
Now allows an author to escalate privileges to access information which should
otherwise be restricted. On successful exploitation, the attacker can cause
limited impact on confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-39595
Disclosure Date: July 09, 2024 (last updated July 09, 2024)
SAP Business Warehouse - Business Planning and
Simulation application does not sufficiently encode user-controlled inputs,
resulting in Stored Cross-Site Scripting (XSS) vulnerability. This
vulnerability allows users to modify website content and on successful
exploitation, an attacker can cause low impact to the confidentiality and
integrity of the application.
0
Attacker Value
Unknown
CVE-2024-39594
Disclosure Date: July 09, 2024 (last updated July 09, 2024)
SAP Business Warehouse - Business Planning and
Simulation application does not sufficiently encode user controlled inputs,
resulting in Reflected Cross-Site Scripting (XSS) vulnerability. After
successful exploitation, an attacker can cause low impact on the confidentiality
and integrity of the application.
0
Attacker Value
Unknown
CVE-2024-37180
Disclosure Date: July 09, 2024 (last updated July 09, 2024)
Under certain conditions SAP NetWeaver
Application Server for ABAP and ABAP Platform allows an attacker to access
remote-enabled function module with no further authorization which would
otherwise be restricted, the function can be used to read non-sensitive
information with low impact on confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-37175
Disclosure Date: July 09, 2024 (last updated September 10, 2024)
SAP CRM WebClient does not
perform necessary authorization check for an authenticated user, resulting in
escalation of privileges. This could allow an attacker to access some sensitive
information.
0
Attacker Value
Unknown
CVE-2024-37172
Disclosure Date: July 09, 2024 (last updated September 10, 2024)
SAP S/4HANA Finance (Advanced Payment
Management) does not perform necessary authorization check for an authenticated
user, resulting in escalation of privileges. As a result, it has a low impact
to confidentiality and availability but there is no impact on the integrity.
0
Attacker Value
Unknown
CVE-2024-37171
Disclosure Date: July 09, 2024 (last updated September 10, 2024)
SAP Transportation Management (Collaboration
Portal) allows an attacker with non-administrative privileges to send a crafted
request from a vulnerable web application. This will trigger the application
handler to send a request to an unintended service, which may reveal
information about that service. The information obtained could be used to
target internal systems behind firewalls that are normally inaccessible to an
attacker from the external network, resulting in a Server-Side Request Forgery
vulnerability. There is no effect on integrity or availability of the
application.
0
Attacker Value
Unknown
CVE-2024-34692
Disclosure Date: July 09, 2024 (last updated September 10, 2024)
Due to missing verification of file type or
content, SAP Enable Now allows an authenticated attacker to upload arbitrary
files. These files include executables which might be downloaded and executed
by the user which could host malware. On successful exploitation an attacker
can cause limited impact on confidentiality and Integrity of the application.
0
Attacker Value
Unknown
CVE-2024-34689
Disclosure Date: July 09, 2024 (last updated September 10, 2024)
WebFlow Services of SAP Business Workflow allows
an authenticated attacker to enumerate accessible HTTP endpoints in the
internal network by specially crafting HTTP requests. On successful
exploitation this can result in information disclosure. It has no impact on
integrity and availability of the application.
0