Show filters
1,715 Total Results
Displaying 121-130 of 1,715
Sort by:
Attacker Value
Unknown

CVE-2024-39598

Disclosure Date: July 09, 2024 (last updated August 30, 2024)
SAP CRM (WebClient UI Framework) allows an authenticated attacker to enumerate accessible HTTP endpoints in the internal network by specially crafting HTTP requests. On successful exploitation this can result in information disclosure. It has no impact on integrity and availability of the application.
Attacker Value
Unknown

CVE-2024-39597

Disclosure Date: July 09, 2024 (last updated July 09, 2024)
In SAP Commerce, a user can misuse the forgotten password functionality to gain access to a Composable Storefront B2B site for which early login and registration is activated, without requiring the merchant to approve the account beforehand. If the site is not configured as isolated site, this can also grant access to other non-isolated early login sites, even if registration is not enabled for those other sites.
0
Attacker Value
Unknown

CVE-2024-39593

Disclosure Date: July 09, 2024 (last updated August 30, 2024)
SAP Landscape Management allows an authenticated user to read confidential data disclosed by the REST Provider Definition response. Successful exploitation can cause high impact on confidentiality of the managed entities.
Attacker Value
Unknown

CVE-2024-39592

Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Elements of PDCE does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This allows an attacker to read sensitive information causing high impact on the confidentiality of the application.
Attacker Value
Unknown

CVE-2024-37174

Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Custom CSS support option in SAP CRM WebClient UI does not sufficiently encode user-controlled inputs resulting in Cross-Site Scripting vulnerability. On successful exploitation an attacker can cause limited impact on confidentiality and integrity of the application.
Attacker Value
Unknown

CVE-2024-37173

Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Due to insufficient input validation, SAP CRM WebClient UI allows an unauthenticated attacker to craft a URL link which embeds a malicious script. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
Attacker Value
Unknown

CVE-2024-34685

Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Due to weak encoding of user-controlled input in SAP NetWeaver Knowledge Management XMLEditor which allows malicious scripts can be executed in the application, potentially leading to a Cross-Site Scripting (XSS) vulnerability. This has no impact on the availability of the application but it has a low impact on its confidentiality and integrity.
Attacker Value
Unknown

CVE-2024-37176

Disclosure Date: June 11, 2024 (last updated August 10, 2024)
SAP BW/4HANA Transformation and Data Transfer Process (DTP) allows an authenticated attacker to gain higher access levels than they should have by exploiting improper authorization checks. This results in escalation of privileges. It has no impact on the confidentiality of data but may have low impacts on the integrity and availability of the application.
Attacker Value
Unknown

CVE-2024-34691

Disclosure Date: June 11, 2024 (last updated August 17, 2024)
Manage Incoming Payment Files (F1680) of SAP S/4HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. As a result, it has high impact on integrity and no impact on the confidentiality and availability of the system.
Attacker Value
Unknown

CVE-2024-34690

Disclosure Date: June 11, 2024 (last updated August 10, 2024)
SAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to access and edit non-sensitive report variants that are typically restricted, causing minimal impact on the confidentiality and integrity of the application.