Common Vulnerabilities and Exposures (CVE)

CVE-2026-24321

Feb 10, 2026 03:03:52 UTC

SAP Commerce Cloud exposes multiple API endpoints to unauthenticated users, allowing them to submit requests to these open endpoints to retrieve sensitive information that is not intended to be publicly accessible via the front-end. This vu...

CVE-2026-24320

Feb 10, 2026 03:03:42 UTC

Due to improper memory management in SAP NetWeaver and ABAP Platform (Application Server ABAP), an authenticated attacker could exploit logical errors in memory management by supplying specially crafted input containing unique characters, w...

CVE-2026-24319

Feb 10, 2026 03:03:33 UTC

In SAP Business One, sensitive information is written to the application�s memory dump files without obfuscation. Gaining access to this information could potentially lead to unauthorized operations within the B1 environment, including modi...

CVE-2026-24312

Feb 10, 2026 03:03:19 UTC

An erroneous authorization check in SAP Business Workflow leads to privilege escalation. An authenticated administrative user can bypass role restrictions by leveraging permissions from a less sensitive function to execute unauthorized, hig...

CVE-2026-23689

Feb 10, 2026 03:03:09 UTC

Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-c...

CVE-2026-23688

Feb 10, 2026 03:02:58 UTC

SAP Fiori App Manage Service Entry Sheets does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has low impact on integrity, confidentiality and availability are not impacted.

CVE-2026-23687

Feb 10, 2026 03:02:47 UTC

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated attacker with normal privileges to obtain a valid signed message and send modified signed XML documents to the verifier. This may result in acceptance of tamper...

CVE-2026-23686

Feb 10, 2026 03:02:37 UTC

Due to a CRLF Injection vulnerability in SAP NetWeaver Application Server Java, an authenticated attacker with administrative access could submit specially crafted content to the application. If processed by the application, this content en...

CVE-2026-23685

Feb 10, 2026 03:02:27 UTC

Due to a Deserialization vulnerability in SAP NetWeaver (JMS service), an attacker authenticated as an administrator with local access could submit specially crafted content to the server. If processed by the application, this content could...

CVE-2026-23684

Feb 10, 2026 03:02:14 UTC

A race condition vulnerability exists in the SAP Commerce cloud. Because of this when an attacker adds products to a cart, it may result in a cart entry being created with erroneous product value which could be checked out. This leads to hi...

CVE-2026-2260

Feb 10, 2026 03:02:07 UTC

A vulnerability was found in D-Link DCS-931L up to 1.13.0. This affects an unknown part of the file /goform/setSysAdmin. The manipulation of the argument AdminID results in os command injection. The attack can be executed remotely. The expl...

CVE-2026-23681

Feb 10, 2026 03:02:03 UTC

Due to missing authorization check in a function module in SAP Support Tools Plug-In, an authenticated attacker could invoke specific function modules to retrieve information about the system and its configuration. This disclosure of the sy...

CVE-2026-0509

Feb 10, 2026 03:01:52 UTC

SAP NetWeaver Application Server ABAP and ABAP Platform allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases. This can result in a high impact on ...

CVE-2026-0508

Feb 10, 2026 03:01:41 UTC

The SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker with high privileges to insert malicious URL within the application. Upon successful exploitation, the victim may click on this malicious URL, resulting...

CVE-2026-0505

Feb 10, 2026 03:01:30 UTC

The BSP applications allow an unauthenticated user to manipulate user-controlled URL parameters that are not sufficiently validated. This could result in unvalidated redirection to attacker-controlled websites, leading to a low impact on co...