Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap Se
Sap Se sap Gui For Windows With Active Guixt |
|
| Vendors & Products |
Sap Se
Sap Se sap Gui For Windows With Active Guixt |
Tue, 10 Mar 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAP GUI for Windows allows DLL files to be loaded from arbitrary directories within the application. An unauthenticated attacker could exploit this vulnerability by persuading a victim to place a malicious DLL within one of these directories. The malicious command is executed in the victim user's context provided GuiXT is enabled. This vulnerability has a low impact on confidentiality, integrity, and availability. | |
| Title | DLL Hijacking vulnerability in SAP GUI for Windows with active GuiXT | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2026-03-11T03:56:32.610Z
Reserved: 2026-01-21T22:15:25.361Z
Link: CVE-2026-24317
Updated: 2026-03-10T15:36:05.638Z
Status : Awaiting Analysis
Published: 2026-03-10T17:35:56.040
Modified: 2026-03-11T13:53:47.157
Link: CVE-2026-24317
No data.
OpenCVE Enrichment
Updated: 2026-03-10T14:06:14Z