Show filters
1,715 Total Results
Displaying 151-160 of 1,715
Sort by:
Attacker Value
Unknown

CVE-2024-32730

Disclosure Date: May 14, 2024 (last updated May 15, 2024)
SAP Enable Now Manager does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, the attacker with the role 'Learner' could gain access to other user's data in manager which will lead to a high impact to the confidentiality of the application.
0
Attacker Value
Unknown

CVE-2024-30218

Disclosure Date: April 09, 2024 (last updated September 28, 2024)
The ABAP Application Server of SAP NetWeaver as well as ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.
0
Attacker Value
Unknown

CVE-2024-30217

Disclosure Date: April 09, 2024 (last updated April 10, 2024)
Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can approve or reject a bank account application affecting the integrity of the application. Confidentiality and Availability are not impacted.
0
Attacker Value
Unknown

CVE-2024-30216

Disclosure Date: April 09, 2024 (last updated April 10, 2024)
Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, attacker can add notes in the review request with 'completed' status affecting the integrity of the application. Confidentiality and Availability are not impacted.
0
Attacker Value
Unknown

CVE-2024-30215

Disclosure Date: April 09, 2024 (last updated April 10, 2024)
The Resource Settings page allows a high privilege attacker to load exploitable payload to be stored and reflected whenever a User visits the page. In a successful attack, some information could be obtained and/or modified. However, the attacker does not have control over what information is obtained, or the amount or kind of loss is limited.
0
Attacker Value
Unknown

CVE-2024-30214

Disclosure Date: April 09, 2024 (last updated April 10, 2024)
The application allows a high privilege attacker to append a malicious GET query parameter to Service invocations, which are reflected in the server response. Under certain circumstances, if the parameter contains a JavaScript, the script could be processed on client side.
0
Attacker Value
Unknown

CVE-2024-28167

Disclosure Date: April 09, 2024 (last updated April 10, 2024)
SAP Group Reporting Data Collection does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.
0
Attacker Value
Unknown

CVE-2024-27901

Disclosure Date: April 09, 2024 (last updated April 10, 2024)
SAP Asset Accounting could allow a high privileged attacker to exploit insufficient validation of path information provided by the users and pass it through to the file API's. Thus, causing a considerable impact on confidentiality, integrity and availability of the application.
0
Attacker Value
Unknown

CVE-2024-27899

Disclosure Date: April 09, 2024 (last updated April 10, 2024)
Self-Registration and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability.
0
Attacker Value
Unknown

CVE-2024-27898

Disclosure Date: April 09, 2024 (last updated February 07, 2025)
SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.