Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32788 | A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) - version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attackers control. |
Wed, 12 Feb 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2025-02-26T19:07:54.186Z
Reserved: 2023-04-03T09:22:43.158Z
Link: CVE-2023-29187
Updated: 2024-08-02T14:00:15.993Z
Status : Modified
Published: 2023-04-11T04:16:08.747
Modified: 2024-11-21T07:56:40.843
Link: CVE-2023-29187
No data.
OpenCVE Enrichment
No data.
EUVD