Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SAP_SE | SAP Enterprise Search for ABAP | SAP_BASIS 752 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-42880 | 9.9 CRITICAL | Code Injection vulnerability in SAP Solution Manager |
| CVE-2025-42928 | 9.1 CRITICAL | Deserialization Vulnerability in SAP jConnect - SDK for ASE |
| CVE-2025-42878 | 8.2 HIGH | Sensitive Data Exposure in SAP Web Dispatcher and Internet Communication Manager (ICM) |
| CVE-2025-42874 | 7.9 HIGH | Denial of service (DOS) in SAP NetWeaver (remote service for Xcelsius) |
| CVE-2025-42877 | 7.5 HIGH | Memory Corruption vulnerability in SAP Web Dispatcher, Internet Communication Manager and |
| CVE-2025-42876 | 7.1 HIGH | Missing Authorization Check in SAP S/4 HANA Private Cloud (Financials General Ledger) |
| CVE-2025-42875 | 6.6 MEDIUM | Missing Authentication check in SAP NetWeaver Internet Communication Framework |
| CVE-2025-42904 | 6.5 MEDIUM | Information Disclosure vulnerability in Application Server ABAP |
| CVE-2025-42872 | 6.1 MEDIUM | Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal |
| CVE-2025-42873 | 5.9 MEDIUM | Denial of Service (DoS) in SAPUI5 framework (Markdown-it component) |
| CVE-2025-42896 | 5.4 MEDIUM | Server-Side Request Forgery (SSRF) in SAP BusinessObjects Business Intelligence Platform |
No comments yet