Extended Application Services Runtime SAP Extended Application Services Runtime

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in SAP Extended Application Services Runtime.

By the Year

In 2026 there have been 0 vulnerabilities in SAP Extended Application Services Runtime. Extended Application Services Runtime did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 2 8.65

It may take a day or so for new Extended Application Services Runtime vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent SAP Extended Application Services Runtime Security Vulnerabilities

SAP CommonCryptoLib Auth Bypass (CVE-2023-40309)
CVE-2023-40309 9.8 - Critical - September 12, 2023

SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.

AuthZ

SAP CommonCryptoLib MemCorruption CVE-2023-40308
CVE-2023-40308 7.5 - High - September 12, 2023

SAP CommonCryptoLib allows an unauthenticated attacker to craft a request, which when submitted to an open port causes a memory corruption error in a library which in turn causes the target component to crash making it unavailable. There is no ability to view or modify any information.

Memory Corruption

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for SAP Extended Application Services Runtime or by SAP? Click the Watch button to subscribe.

SAP
Vendor

subscribe