Show filters
1,715 Total Results
Displaying 171-180 of 1,715
Sort by:
Attacker Value
Unknown

CVE-2024-29870

Disclosure Date: March 21, 2024 (last updated January 25, 2025)
SQL injection vulnerability in Sentrifugo 3.2, through /sentrifugo/index.php/index/getdepartments/format/html, 'business_id' parameter./sentrifugo/index.php/index/getdepartments/format/html, 'business_id' parameter. The exploitation of this vulnerability could allow a remote user to send a specially crafted query to the server and extract all the data from it.
Attacker Value
Unknown

CVE-2024-28163

Disclosure Date: March 12, 2024 (last updated February 08, 2025)
Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration (PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.
Attacker Value
Unknown

CVE-2024-27902

Disclosure Date: March 12, 2024 (last updated April 01, 2024)
Applications based on SAP GUI for HTML in SAP NetWeaver AS ABAP - versions 7.89, 7.93, do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. A successful attack can allow a malicious attacker to access and modify data through their ability to execute code in a user’s browser. There is no impact on the availability of the system
0
Attacker Value
Unknown

CVE-2024-27900

Disclosure Date: March 12, 2024 (last updated April 01, 2024)
Due to missing authorization check, attacker with business user account in SAP ABAP Platform - version 758, 795, can change the privacy setting of job templates from shared to private. As a result, the selected template would only be accessible to the owner.
0
Attacker Value
Unknown

CVE-2024-25645

Disclosure Date: March 12, 2024 (last updated February 08, 2025)
Under certain condition SAP NetWeaver (Enterprise Portal) - version 7.50 allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application.
Attacker Value
Unknown

CVE-2024-25644

Disclosure Date: March 12, 2024 (last updated September 28, 2024)
Under certain conditions SAP NetWeaver WSRM - version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.
0
Attacker Value
Unknown

CVE-2024-22133

Disclosure Date: March 12, 2024 (last updated April 01, 2024)
SAP Fiori Front End Server - version 605, allows altering of approver details on the read-only field when sending leave request information. This could lead to creation of request with incorrect approver causing low impact on Confidentiality and Integrity with no impact on Availability of the application.
0
Attacker Value
Unknown

CVE-2024-22127

Disclosure Date: March 12, 2024 (last updated February 08, 2025)
SAP NetWeaver Administrator AS Java (Administrator Log Viewer plug-in) - version 7.50, allows an attacker with high privileges to upload potentially dangerous files which leads to command injection vulnerability. This would enable the attacker to run commands which can cause high impact on confidentiality, integrity and availability of the application.
Attacker Value
Unknown

CVE-2024-25643

Disclosure Date: February 13, 2024 (last updated October 17, 2024)
The SAP Fiori app (My Overtime Request) - version 605, does not perform the necessary authorization checks for an authenticated user which may result in an escalation of privileges. It is possible to manipulate the URLs of data requests to access information that the user should not have access to. There is no impact on integrity and availability.
Attacker Value
Unknown

CVE-2024-24741

Disclosure Date: February 13, 2024 (last updated October 17, 2024)
SAP Master Data Governance for Material Data - versions 618, 619, 620, 621, 622, 800, 801, 802, 803, 804, does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read some sensitive information but no impact to integrity and availability.