Show filters
1,715 Total Results
Displaying 151-160 of 1,715
Sort by:
Attacker Value
Unknown
CVE-2024-32730
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
SAP Enable Now Manager does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, the attacker with the role 'Learner' could gain access to other user's data in manager which will lead to a high impact to the confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-30218
Disclosure Date: April 09, 2024 (last updated September 28, 2024)
The ABAP Application Server of SAP NetWeaver as well as ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.
0
Attacker Value
Unknown
CVE-2024-30217
Disclosure Date: April 09, 2024 (last updated April 10, 2024)
Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, an attacker can approve or reject a bank account application affecting the integrity of the application. Confidentiality and Availability are not impacted.
0
Attacker Value
Unknown
CVE-2024-30216
Disclosure Date: April 09, 2024 (last updated April 10, 2024)
Cash Management in SAP S/4 HANA does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. By exploiting this vulnerability, attacker can add notes in the review request with 'completed' status affecting the integrity of the application. Confidentiality and Availability are not impacted.
0
Attacker Value
Unknown
CVE-2024-30215
Disclosure Date: April 09, 2024 (last updated April 10, 2024)
The Resource Settings page allows a high privilege attacker to load exploitable payload to be stored and reflected whenever a User visits the page. In a successful attack, some information could be obtained and/or modified. However, the attacker does not have control over what information is obtained, or the amount or kind of loss is limited.
0
Attacker Value
Unknown
CVE-2024-30214
Disclosure Date: April 09, 2024 (last updated April 10, 2024)
The application allows a high privilege attacker to append a malicious GET query parameter to Service invocations, which are reflected in the server response. Under certain circumstances, if the parameter contains a JavaScript, the script could be processed on client side.
0
Attacker Value
Unknown
CVE-2024-28167
Disclosure Date: April 09, 2024 (last updated April 10, 2024)
SAP Group Reporting Data Collection does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.
0
Attacker Value
Unknown
CVE-2024-27901
Disclosure Date: April 09, 2024 (last updated April 10, 2024)
SAP Asset Accounting could allow a high privileged attacker to exploit insufficient validation of path information provided by the users and pass it through to the file API's. Thus, causing a considerable impact on confidentiality, integrity and availability of the application.
0
Attacker Value
Unknown
CVE-2024-27899
Disclosure Date: April 09, 2024 (last updated April 10, 2024)
Self-Registration and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability.
0
Attacker Value
Unknown
CVE-2024-27898
Disclosure Date: April 09, 2024 (last updated February 07, 2025)
SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.
0