Vulnerabilities (CVE)

Filtered by vendor Sap Subscribe
Total 1487 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-21492 1 Sap 1 Netweaver Application Server Java 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
SAP NetWeaver Application Server Java(HTTP Service), versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate logon group in URLs, resulting in a content spoofing vulnerability when directory listing is enabled.
CVE-2021-21491 1 Sap 1 Netweaver Application Server Java 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
SAP Netweaver Application Server Java (Applications based on WebDynpro Java) versions 7.00, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
CVE-2021-21490 1 Sap 1 Netweaver Application Server Abap 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SAP NetWeaver AS for ABAP (Web Survey), versions - 700, 702, 710, 711, 730, 731, 750, 750, 752, 75A, 75F, does not sufficiently encode input and output parameters which results in reflected cross site scripting vulnerability, through which a malicious user can access data relating to the current session and use it to impersonate a user and access all information with the same rights as the target user.
CVE-2021-21489 1 Sap 1 Netweaver Enterprise Portal 2024-11-21 3.5 LOW 4.8 MEDIUM
SAP NetWeaver Enterprise Portal versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user related data, resulting in Stored Cross-Site Scripting (XSS) vulnerability. This would allow an attacker with administrative privileges to store a malicious script on the portal. The execution of the script content by a victim registered on the portal could compromise the confidentiality and integrity of portal content.
CVE-2021-21488 1 Sap 1 Netweaver Knowledge Management 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Knowledge Management versions 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 allows a remote attacker with basic privileges to deserialize user-controlled data without verification, leading to insecure deserialization which triggers the attacker’s code, therefore impacting Availability.
CVE-2021-21487 1 Sap 1 Payment Engine 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP Payment Engine version 500, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
CVE-2021-21486 1 Sap 1 Enterprise Financial Services 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
CVE-2021-21485 1 Sap 1 Netweaver Application Server Java 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
An unauthorized attacker may be able to entice an administrator to invoke telnet commands of an SAP NetWeaver Application Server for Java that allow the attacker to gain NTLM hashes of a privileged user.
CVE-2021-21484 1 Sap 1 Hana 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind.
CVE-2021-21483 1 Sap 1 Solution Manager 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
Under certain conditions SAP Solution Manager, version - 720, allows a high privileged attacker to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application.
CVE-2021-21482 1 Sap 1 Netweaver Master Data Management 2024-11-21 4.8 MEDIUM 8.3 HIGH
SAP NetWeaver Master Data Management, versions - 710, 710.750, allows a malicious unauthorized user with access to the MDM Server subnet to find the password using a brute force method. If successful, the attacker could obtain access to highly sensitive data and MDM administrative privileges leading to information disclosure vulnerability thereby affecting the confidentiality and integrity of the application. This happens when security guidelines and recommendations concerning administrative accounts of an SAP NetWeaver Master Data Management installation have not been thoroughly reviewed.
CVE-2021-21481 1 Sap 1 Netweaver 2024-11-21 8.3 HIGH 8.8 HIGH
The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized attacker to access configuration objects, including such that grant administrative privileges. This could result in complete compromise of system confidentiality, integrity, and availability.
CVE-2021-21479 1 Sap 1 Scimono 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
In SCIMono before 0.0.19, it is possible for an attacker to inject and execute java expression compromising the availability and integrity of the system.
CVE-2021-21478 1 Sap 1 Web Dynpro Abap 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
CVE-2021-21477 1 Sap 1 Commerce 2024-11-21 9.0 HIGH 9.9 CRITICAL
SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution vulnerability enabling the attacker to compromise the underlying host enabling him to impair confidentiality, integrity and availability of the application.
CVE-2021-21476 1 Sap 1 Ui5 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
CVE-2021-21475 1 Sap 1 Netweaver Master Data Management Server 2024-11-21 5.0 MEDIUM 7.5 HIGH
Under specific circumstances SAP Master Data Management, versions - 710, 710.750, allows an unauthorized attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs. Due to this Directory Traversal vulnerability the attacker could read content of arbitrary files on the remote server and expose sensitive data.
CVE-2021-21474 1 Sap 1 Hana Database 2024-11-21 5.5 MEDIUM 6.5 MEDIUM
SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and without invalidating the digital signature, this allows them to impersonate as user in HANA database and be able to read the contents in the database.
CVE-2021-21473 1 Sap 1 Netweaver Application Server Abap 2024-11-21 6.5 MEDIUM 6.3 MEDIUM
SAP NetWeaver AS ABAP and ABAP Platform, versions - 700, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, contains function module SRM_RFC_SUBMIT_REPORT which fails to validate authorization of an authenticated user thus allowing an unauthorized user to execute reports in SAP NetWeaver ABAP Platform.
CVE-2021-21472 1 Sap 1 Software Provisioning Manager 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP Software Provisioning Manager 1.0 (SAP NetWeaver Master Data Management Server 7.1) does not have an option to set password during its installation, this allows an authenticated attacker to perform various security attacks like Directory Traversal, Password Brute force Attack, SMB Relay attack, Security Downgrade.