Description
SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity of the application.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53531 | SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity of the application. |
References
History
Wed, 09 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 28 Sep 2024 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 |
Sat, 28 Sep 2024 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity of the application. | SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity of the application. |
| Weaknesses | CWE-732 |
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-10-09T13:25:33.422Z
Reserved: 2023-11-27T18:07:40.886Z
Link: CVE-2023-49578
Updated: 2024-08-02T22:01:25.933Z
Status : Modified
Published: 2023-12-12T02:15:07.283
Modified: 2024-11-21T08:33:35.570
Link: CVE-2023-49578
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD