Multiple vulnerabilities in SAP software can be exploited by an attacker to perform SQL injection, gain elevated privileges, execute arbitrary code, bypass security measures, conduct cross-site scripting attacks, manipulate data, disclose confidential information, or cause other unspecified impacts.
| Vendor | Product | Versions |
|---|---|---|
| sap | sap software | — |