SAP

Netweaver Application Server For Abap

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 10.09.2024 05:15:12
  • Last modified 10.09.2024 12:09:50

The RFC enabled function module allows a low privileged user to perform denial of service on any user and also change or delete favourite nodes. By sending a crafted packet in the function module targeting specific parameters, the specific targeted u...

  • EPSS 0.14%
  • Published 10.09.2024 05:15:11
  • Last modified 10.09.2024 12:09:50

The RFC enabled function module allows a low privileged user to perform various actions, such as modifying the URLs of any user's favourite nodes and workbook ID. There is low impact on integrity and availability of the application.

  • EPSS 0.17%
  • Published 10.09.2024 05:15:11
  • Last modified 10.09.2024 12:09:50

Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this l...

  • EPSS 0.09%
  • Published 10.09.2024 03:15:03
  • Last modified 10.09.2024 12:09:50

The RFC enabled function module allows a low privileged user to add any workbook to any user's workplace favourites. This vulnerability could be utilized to identify usernames and access information about targeted user's workplaces. There is low impa...

  • EPSS 0.12%
  • Published 10.09.2024 03:15:02
  • Last modified 10.09.2024 12:09:50

The RFC enabled function module allows a low privileged user to delete the workplace favourites of any user. This vulnerability could be utilized to identify usernames and access information about targeted user's workplaces and nodes. There is low im...

  • EPSS 0.09%
  • Published 10.09.2024 03:15:02
  • Last modified 10.09.2024 12:09:50

The RFC enabled function module allows a low privileged user to read any user's workplace favourites and user menu along with all the specific data of each node. Usernames can be enumerated by exploiting vulnerability. There is low impact on confiden...