Filtered by vendor Sap
Subscribe
Total
1487 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-21492 | 1 Sap | 1 Netweaver Application Server Java | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
SAP NetWeaver Application Server Java(HTTP Service), versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate logon group in URLs, resulting in a content spoofing vulnerability when directory listing is enabled. | |||||
CVE-2021-21491 | 1 Sap | 1 Netweaver Application Server Java | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
SAP Netweaver Application Server Java (Applications based on WebDynpro Java) versions 7.00, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. | |||||
CVE-2021-21490 | 1 Sap | 1 Netweaver Application Server Abap | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
SAP NetWeaver AS for ABAP (Web Survey), versions - 700, 702, 710, 711, 730, 731, 750, 750, 752, 75A, 75F, does not sufficiently encode input and output parameters which results in reflected cross site scripting vulnerability, through which a malicious user can access data relating to the current session and use it to impersonate a user and access all information with the same rights as the target user. | |||||
CVE-2021-21489 | 1 Sap | 1 Netweaver Enterprise Portal | 2024-11-21 | 3.5 LOW | 4.8 MEDIUM |
SAP NetWeaver Enterprise Portal versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user related data, resulting in Stored Cross-Site Scripting (XSS) vulnerability. This would allow an attacker with administrative privileges to store a malicious script on the portal. The execution of the script content by a victim registered on the portal could compromise the confidentiality and integrity of portal content. | |||||
CVE-2021-21488 | 1 Sap | 1 Netweaver Knowledge Management | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
Knowledge Management versions 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 allows a remote attacker with basic privileges to deserialize user-controlled data without verification, leading to insecure deserialization which triggers the attacker’s code, therefore impacting Availability. | |||||
CVE-2021-21487 | 1 Sap | 1 Payment Engine | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
SAP Payment Engine version 500, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. | |||||
CVE-2021-21486 | 1 Sap | 1 Enterprise Financial Services | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. | |||||
CVE-2021-21485 | 1 Sap | 1 Netweaver Application Server Java | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
An unauthorized attacker may be able to entice an administrator to invoke telnet commands of an SAP NetWeaver Application Server for Java that allow the attacker to gain NTLM hashes of a privileged user. | |||||
CVE-2021-21484 | 1 Sap | 1 Hana | 2024-11-21 | 6.8 MEDIUM | 9.8 CRITICAL |
LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind. | |||||
CVE-2021-21483 | 1 Sap | 1 Solution Manager | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
Under certain conditions SAP Solution Manager, version - 720, allows a high privileged attacker to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application. | |||||
CVE-2021-21482 | 1 Sap | 1 Netweaver Master Data Management | 2024-11-21 | 4.8 MEDIUM | 8.3 HIGH |
SAP NetWeaver Master Data Management, versions - 710, 710.750, allows a malicious unauthorized user with access to the MDM Server subnet to find the password using a brute force method. If successful, the attacker could obtain access to highly sensitive data and MDM administrative privileges leading to information disclosure vulnerability thereby affecting the confidentiality and integrity of the application. This happens when security guidelines and recommendations concerning administrative accounts of an SAP NetWeaver Master Data Management installation have not been thoroughly reviewed. | |||||
CVE-2021-21481 | 1 Sap | 1 Netweaver | 2024-11-21 | 8.3 HIGH | 8.8 HIGH |
The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized attacker to access configuration objects, including such that grant administrative privileges. This could result in complete compromise of system confidentiality, integrity, and availability. | |||||
CVE-2021-21479 | 1 Sap | 1 Scimono | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
In SCIMono before 0.0.19, it is possible for an attacker to inject and execute java expression compromising the availability and integrity of the system. | |||||
CVE-2021-21478 | 1 Sap | 1 Web Dynpro Abap | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. | |||||
CVE-2021-21477 | 1 Sap | 1 Commerce | 2024-11-21 | 9.0 HIGH | 9.9 CRITICAL |
SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution vulnerability enabling the attacker to compromise the underlying host enabling him to impair confidentiality, integrity and availability of the application. | |||||
CVE-2021-21476 | 1 Sap | 1 Ui5 | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. | |||||
CVE-2021-21475 | 1 Sap | 1 Netweaver Master Data Management Server | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Under specific circumstances SAP Master Data Management, versions - 710, 710.750, allows an unauthorized attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs. Due to this Directory Traversal vulnerability the attacker could read content of arbitrary files on the remote server and expose sensitive data. | |||||
CVE-2021-21474 | 1 Sap | 1 Hana Database | 2024-11-21 | 5.5 MEDIUM | 6.5 MEDIUM |
SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and without invalidating the digital signature, this allows them to impersonate as user in HANA database and be able to read the contents in the database. | |||||
CVE-2021-21473 | 1 Sap | 1 Netweaver Application Server Abap | 2024-11-21 | 6.5 MEDIUM | 6.3 MEDIUM |
SAP NetWeaver AS ABAP and ABAP Platform, versions - 700, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, contains function module SRM_RFC_SUBMIT_REPORT which fails to validate authorization of an authenticated user thus allowing an unauthorized user to execute reports in SAP NetWeaver ABAP Platform. | |||||
CVE-2021-21472 | 1 Sap | 1 Software Provisioning Manager | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
SAP Software Provisioning Manager 1.0 (SAP NetWeaver Master Data Management Server 7.1) does not have an option to set password during its installation, this allows an authenticated attacker to perform various security attacks like Directory Traversal, Password Brute force Attack, SMB Relay attack, Security Downgrade. |