cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-21735,https://securityvulnerability.io/vulnerability/CVE-2024-21735,Improper Authorization check in SAP LT Replication Server,"The vulnerability in SAP LT Replication Server arises from the failure to enforce proper authorization checks in versions S4CORE 103 through S4CORE 108. This oversight could empower an attacker with elevated privileges to execute unintended actions, potentially compromising key aspects of the system's confidentiality, integrity, and availability. Organizations utilizing these versions are urged to implement immediate security measures to mitigate the risks associated with this vulnerability.",SAP,SAP LT Replication Server,7.2,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2024-01-09T01:15:00.000Z,0 CVE-2021-38176,https://securityvulnerability.io/vulnerability/CVE-2021-38176,Improper Input Sanitization in SAP Products Allows Remote Code Execution,"This vulnerability arises from insufficient input sanitization within SAP NetWeaver, enabling authenticated users with specific privileges to remotely invoke NZDT function modules. This capability allows for the execution of manipulated queries or the injection of ABAP code, potentially leading to unauthorized access to the backend database. Successful exploitation can severely undermine the confidentiality, integrity, and availability of the affected systems, highlighting the critical need for prompt remediation.",SAP,"SAP S/4hana,SAP Lt Replication Server,SAP Ltrs For S/4hana,SAP Test Data Migration Server,SAP Landscape Transformation",9.9,CRITICAL,0.0010400000028312206,false,,false,false,false,,,false,false,,2021-09-14T11:19:07.000Z,0