Latest CVE Feed
-
6.1
MEDIUMCVE-2024-42378
Due to weak encoding of user-controlled inputs, eProcurement on SAP S/4HANA allows malicious scripts to be executed in the application, potentially leading to a Reflected Cross-Site Scripting (XSS) vulnerability. This has no impact on the availability of ... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
5.4
MEDIUMCVE-2024-44117
The RFC enabled function module allows a low privileged user to perform various actions, such as modifying the URLs of any user's favourite nodes and workbook ID. There is low impact on integrity and availability of the application.... Read more
Affected Products : netweaver_application_server_abap- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
4.3
MEDIUMCVE-2024-44116
The RFC enabled function module allows a low privileged user to add any workbook to any user's workplace favourites. This vulnerability could be utilized to identify usernames and access information about targeted user's workplaces. There is low impact on... Read more
Affected Products : netweaver_application_server_abap- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
5.9
MEDIUMCVE-2023-30755
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions < V3.5.20), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions < V3.5.20), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions < V3.5.20), SIMA... Read more
- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
8.2
HIGHCVE-2023-30756
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions < V3.5.20), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions < V3.5.20), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions < V3.5.20), SIMA... Read more
- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
7.8
HIGHCVE-2024-41170
A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0015), Tecnomatix Plant Simulation V2404 (All versions < V2404.0004). The affected applications contain a stack based overflow vulnerability while parsing speci... Read more
Affected Products : tecnomatix_plant_simulation- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
6.1
MEDIUMCVE-2024-45279
Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this link, ... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
4.8
MEDIUMCVE-2024-45280
Due to insufficient encoding of user-controlled inputs, SAP NetWeaver AS Java allows malicious scripts to be executed in the login application. This has a limited impact on confidentiality and integrity of the application. There is no impact on availabili... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
6.5
MEDIUMCVE-2024-45286
Due to lack of proper authorization checks when calling user, a function module in obsolete Tobin interface in SAP Production and Revenue Accounting allows unauthorized access that could lead to disclosure of highly sensitive data. There is no impact on i... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
4.7
MEDIUMCVE-2024-44120
SAP NetWeaver Enterprise Portal is vulnerable to reflected cross site scripting due to insufficient encoding of user-controlled input. An unauthenticated attacker could craft a malicious URL and trick a user to click it. If the victim clicks on this craft... Read more
Affected Products : netweaver- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
9.3
CRITICALCVE-2024-42500
HPE has identified a denial of service vulnerability in HPE HP-UX System's Network File System (NFSv4) services.... Read more
Affected Products :- Published: Sep. 09, 2024
- Modified: Sep. 10, 2024
-
4.3
MEDIUMCVE-2024-41729
Due to missing authorization checks, SAP BEx Analyzer allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a limited impact on conf... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
5.4
MEDIUMCVE-2024-42371
The RFC enabled function module allows a low privileged user to delete the workplace favourites of any user. This vulnerability could be utilized to identify usernames and access information about targeted user's workplaces and nodes. There is low impact ... Read more
Affected Products : netweaver_application_server_abap- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
4.3
MEDIUMCVE-2024-44115
The RFC enabled function module allows a low privileged user to add URLs to any user's workplace favourites. This vulnerability could be utilized to identify usernames and access information about targeted user's workplaces, and nodes. There is low impact... Read more
Affected Products : netweaver_application_server_abap- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
2.4
LOWCVE-2024-45284
An authenticated attacker with high privilege can use functions of SLCM transactions to which access should be restricted. This may result in an escalation of privileges causing low impact on integrity of the application.... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
5.9
MEDIUMCVE-2024-21528
All versions of the package node-gettext are vulnerable to Prototype Pollution via the addTranslations() function in gettext.js due to improper user input sanitization.... Read more
Affected Products :- Published: Sep. 10, 2024
- Modified: Sep. 10, 2024
-
5.5
MEDIUMCVE-2024-44944
In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, oth... Read more
Affected Products : linux_kernel- Published: Aug. 30, 2024
- Modified: Sep. 10, 2024
-
8.8
HIGHCVE-2024-44333
D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution. An attacker can achieve arbitrary command execution by... Read more
Affected Products :- Published: Sep. 09, 2024
- Modified: Sep. 09, 2024
-
8.8
HIGHCVE-2024-44335
D-Link DI-7003G v19.12.24A1, DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution (RCE) via version_upgrade.asp.... Read more
Affected Products :- Published: Sep. 09, 2024
- Modified: Sep. 09, 2024
-
8.8
HIGHCVE-2024-44334
D-Link DI-7003GV2 v24.04.18D1, DI-7100G+V2 v24.04.18D1, DI-7100GV2 v24.04.18D1, DI-7200GV2 v24.04.18E1, DI-7300G+V2 v24.04.18D1, and DI-7400G+V2 v24.04.18D1 are vulnerable to Remote Command Execution due to insufficient parameter filtering in the CGI hand... Read more
Affected Products :- Published: Sep. 09, 2024
- Modified: Sep. 09, 2024