cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-22131,https://securityvulnerability.io/vulnerability/CVE-2024-22131,Remote Execution Vulnerability Affects SAP ABA Versions 700-752,"A security vulnerability exists in SAP Application Basis (ABA) across multiple versions, where an attacker with remote execution authorization can exploit a susceptible interface. This vulnerability enables the attacker to invoke application functions and perform unauthorized actions, potentially allowing them to read or modify sensitive user and business data. Moreover, certain functions may lead to system unavailability, impacting overall business operations. Organizations running affected versions of SAP ABA should prioritize remediation to protect their data integrity and operational continuity.",SAP,SAP Aba (application Basis),7.2,HIGH,0.0005699999746866524,false,false,false,false,,false,false,2024-02-13T02:30:51.886Z,0 CVE-2018-2481,https://securityvulnerability.io/vulnerability/CVE-2018-2481,,"In some SAP standard roles, in SAP_ABA versions, 7.00 to 7.02, 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, 75C to 75D, a transaction code reserved for customer is used. By implementing such transaction code a malicious user may execute unauthorized transaction functionality.",SAP,SAP Aba,7.2,HIGH,0.0024800000246614218,false,false,false,false,,false,false,2018-11-13T20:00:00.000Z,0 CVE-2016-4551,https://securityvulnerability.io/vulnerability/CVE-2016-4551,,"The (1) SAP_BASIS and (2) SAP_ABA components 7.00 SP Level 0031 in SAP NetWeaver 2004s might allow remote attackers to spoof IP addresses written to the Security Audit Log via vectors related to the network landscape, aka SAP Security Note 2190621.",SAP,"Netweaver,SAP Aba,SAP Basis",7.5,HIGH,0.0027600000612437725,false,false,false,false,,false,false,2016-10-05T16:00:00.000Z,0