{"uuid": "1752a9d4-0e41-41fb-a2f1-f0aa6784ef1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45285", "type": "seen", "source": "https://t.me/cvedetector/5161", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45285 - SAP RFC Denial of Service and Persistence Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-45285 \nPublished : Sept. 10, 2024, 5:15 a.m. | 15\u00a0minutes ago \nDescription : The RFC enabled function module allows a low privileged user to perform denial of service on any user and also change or delete favourite nodes. By sending a crafted packet in the function module targeting specific parameters, the specific targeted user will no longer have access to any functionality of SAP GUI. There is low impact on integrity and availability of the application. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T07:32:17.000000Z"}