Show filters
1,715 Total Results
Displaying 121-130 of 1,715
Sort by:
Attacker Value
Unknown
CVE-2024-39598
Disclosure Date: July 09, 2024 (last updated August 30, 2024)
SAP CRM (WebClient UI Framework) allows an
authenticated attacker to enumerate accessible HTTP endpoints in the internal
network by specially crafting HTTP requests. On successful exploitation this
can result in information disclosure. It has no impact on integrity and
availability of the application.
0
Attacker Value
Unknown
CVE-2024-39597
Disclosure Date: July 09, 2024 (last updated July 09, 2024)
In SAP Commerce, a user can misuse the forgotten
password functionality to gain access to a Composable Storefront B2B site for
which early login and registration is activated, without requiring the merchant
to approve the account beforehand. If the site is not configured as isolated
site, this can also grant access to other non-isolated early login sites, even
if registration is not enabled for those other sites.
0
Attacker Value
Unknown
CVE-2024-39593
Disclosure Date: July 09, 2024 (last updated August 30, 2024)
SAP Landscape Management allows an authenticated
user to read confidential data disclosed by the REST Provider Definition
response. Successful exploitation can cause high impact on confidentiality of
the managed entities.
0
Attacker Value
Unknown
CVE-2024-39592
Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Elements of PDCE does not perform necessary
authorization checks for an authenticated user, resulting in escalation of
privileges.
This
allows an attacker to read sensitive information causing high impact on the
confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-37174
Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Custom CSS support option in SAP CRM WebClient
UI does not sufficiently encode user-controlled inputs resulting in Cross-Site
Scripting vulnerability. On successful exploitation an attacker can cause
limited impact on confidentiality and integrity of the application.
0
Attacker Value
Unknown
CVE-2024-37173
Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Due to insufficient input validation, SAP
CRM WebClient UI allows an unauthenticated attacker to craft a URL link which
embeds a malicious script. When a victim clicks on this link, the script will
be executed in the victim's browser giving the attacker the ability to access
and/or modify information with no effect on availability of the application.
0
Attacker Value
Unknown
CVE-2024-34685
Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Due to weak encoding of user-controlled input in
SAP NetWeaver Knowledge Management XMLEditor which allows malicious scripts can
be executed in the application, potentially leading to a Cross-Site Scripting
(XSS) vulnerability. This has no impact on the availability of the application
but it has a low impact on its confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2024-37176
Disclosure Date: June 11, 2024 (last updated August 10, 2024)
SAP BW/4HANA Transformation and Data Transfer
Process (DTP) allows an authenticated attacker to gain higher access levels
than they should have by exploiting improper authorization checks. This results
in escalation of privileges. It has no impact on the confidentiality of data
but may have low impacts on the integrity and availability of the application.
0
Attacker Value
Unknown
CVE-2024-34691
Disclosure Date: June 11, 2024 (last updated August 17, 2024)
Manage Incoming Payment Files (F1680) of SAP
S/4HANA does not perform necessary authorization checks for an authenticated
user, resulting in escalation of privileges. As a result, it has high impact on
integrity and no impact on the confidentiality and availability of the system.
0
Attacker Value
Unknown
CVE-2024-34690
Disclosure Date: June 11, 2024 (last updated August 10, 2024)
SAP Student Life Cycle
Management (SLcM) fails to conduct proper authorization checks for
authenticated users, leading to the potential escalation of privileges. On
successful exploitation it could allow an attacker to access and edit
non-sensitive report variants that are typically restricted, causing minimal
impact on the confidentiality and integrity of the application.
0