A vulnerability, which was classified as problematic, has been found in SAP NetWeaver up to 757. This issue affects some unknown processing of the component Change/Transport System. The manipulation leads to resource consumption.
The identification of this vulnerability is CVE-2023-32114. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in SAP NetWeaver Application Server ABAP and ABAP Platform up to 7.93. Affected is an unknown function. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2023-35874. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in SAP Enable Now 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Response Header Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2023-36919. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in SAP Business One 10.0. It has been classified as problematic. This affects an unknown part of the component Service Layer. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2023-37487. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as problematic has been found in SAP Supplier Relationship Management up to 617. Affected is an unknown function of the component Vendor Master Data for Business Partners Replication. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2023-39436. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in SAP PowerDesigner 16.7 and classified as critical. This vulnerability affects unknown code of the component Proxy Handler. The manipulation leads to improper access controls.
This vulnerability was named CVE-2023-37483. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in CLA-assistant. It has been classified as critical. This affects an unknown part of the component API. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2023-39438. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in SAP BusinessObjects Business Intelligence Platform 420/430. This affects an unknown part of the component Promotion Management. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2023-40622. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in SAP Business One 10.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component SMB Shared Folder Handler. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2023-31403. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Knox Software Arkeia 4.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component rnavc/nlserverd. The manipulation of the argument HOME as part of Environment Variable leads to memory corruption.
This vulnerability is handled as CVE-1999-1534. Attacking locally is a requirement. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in Microsoft Windows. Affected is an unknown function of the component TCPIP. The manipulation leads to integer underflow.
This vulnerability is traded as CVE-2024-38063. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Nessus Vulnerability Scanner 3.0.6 and classified as critical. This issue affects some unknown processing in the library scan.dll of the component ActiveX Control. The manipulation leads to path traversal.
The identification of this vulnerability is CVE-2007-4031. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.