Show filters
1,715 Total Results
Displaying 131-140 of 1,715
Sort by:
Attacker Value
Unknown
CVE-2024-34688
Disclosure Date: June 11, 2024 (last updated August 10, 2024)
Due to unrestricted access to the Meta Model
Repository services in SAP NetWeaver AS Java, attackers can perform DoS attacks
on the application, which may prevent legitimate users from accessing it. This
can result in no impact on confidentiality and integrity but a high impact on
the availability of the application.
0
Attacker Value
Unknown
CVE-2024-34686
Disclosure Date: June 11, 2024 (last updated August 17, 2024)
Due to insufficient input validation, SAP CRM
WebClient UI allows an unauthenticated attacker to craft a URL link which
embeds a malicious script. When a victim clicks on this link, the script will
be executed in the victim's browser giving the attacker the ability to access
and/or modify information with no effect on availability of the application.
0
Attacker Value
Unknown
CVE-2024-34684
Disclosure Date: June 11, 2024 (last updated August 10, 2024)
On Unix, SAP BusinessObjects Business
Intelligence Platform (Scheduling) allows an authenticated attacker with
administrator access on the local server to access the password of a local
account. As a result, an attacker can obtain non-administrative user
credentials, which will allow them to read or modify the remote server files.
0
Attacker Value
Unknown
CVE-2024-34683
Disclosure Date: June 11, 2024 (last updated August 10, 2024)
An authenticated attacker can upload malicious
file to SAP Document Builder service. When the victim accesses this file, the
attacker is allowed to access, modify, or make the related information
unavailable in the victim’s browser.
0
Attacker Value
Unknown
CVE-2024-33001
Disclosure Date: June 11, 2024 (last updated August 10, 2024)
SAP NetWeaver and ABAP platform allows an
attacker to impede performance for legitimate users by crashing or flooding the
service.
An
impact of this Denial of Service vulnerability might be long response delays
and service interruptions, thus degrading the service quality experienced by
legitimate users causing high impact on availability of the application.
0
Attacker Value
Unknown
CVE-2024-28164
Disclosure Date: June 11, 2024 (last updated August 07, 2024)
SAP NetWeaver AS Java (CAF - Guided Procedures)
allows an unauthenticated user to access non-sensitive information about the
server which would otherwise be restricted causing low impact on
confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-37178
Disclosure Date: June 11, 2024 (last updated June 11, 2024)
SAP Financial Consolidation does not
sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting
(XSS) vulnerability. These endpoints are exposed over the network. The
vulnerability can exploit resources beyond the vulnerable component. On
successful exploitation, an attacker can cause limited impact to
confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-37177
Disclosure Date: June 11, 2024 (last updated June 11, 2024)
SAP Financial Consolidation allows data to enter
a Web application through an untrusted source. These endpoints are exposed over
the network and it allows the user to modify the content from the web site. On
successful exploitation, an attacker can cause significant impact to
confidentiality and integrity of the application.
0
Attacker Value
Unknown
CVE-2024-4139
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Manage Bank Statement ReProcessing Rules does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can delete rules of other users affecting the integrity of the application. Confidentiality and Availability are not affected.
0
Attacker Value
Unknown
CVE-2024-4138
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Manage Bank Statement ReProcessing Rules does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can enable/disable the sharing rule of other users affecting the integrity of the application. Confidentiality and Availability are not affected.
0