Latest CVE Feed
-
7.5
HIGHCVE-2021-27629
SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without sp... Read more
Affected Products : netweaver_as_abap- EPSS Score: %0.28
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27628
SAP NetWeaver ABAP Server and ABAP Platform (Dispatcher), versions - KRNL32NUC - 7.22,7.22EXT, KRNL32UC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allo... Read more
Affected Products : netweaver_as_abap- EPSS Score: %0.28
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27627
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- EPSS Score: %0.51
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27626
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- EPSS Score: %0.51
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27625
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- EPSS Score: %0.51
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27624
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- EPSS Score: %0.51
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27623
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- EPSS Score: %0.27
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27622
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- EPSS Score: %0.51
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-27621
Information Disclosure vulnerability in UserAdmin application in SAP NetWeaver Application Server for Java, versions - 7.11,7.20,7.30,7.31,7.40 and 7.50 allows attackers to access restricted information by entering malicious server name.... Read more
- EPSS Score: %0.22
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27620
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- EPSS Score: %0.51
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-27619
SAP Commerce (Backoffice Search), versions - 1808, 1811, 1905, 2005, 2011, allows a low privileged user to search for attributes which are not supposed to be displayed to them. Although the search results are masked, the user can iteratively enter one cha... Read more
Affected Products : commerce- EPSS Score: %0.18
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-27618
The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not check the file type extension of the file uploaded from local source. An attacker could craft a malicious file and upload it to the ... Read more
Affected Products : netweaver_process_integration- EPSS Score: %0.21
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-27617
The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and pars... Read more
Affected Products : netweaver_process_integration- EPSS Score: %0.21
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-27616
Under certain conditions, SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One for SAP HANA, allows an attacker to exploit an insecure temporary backup path and to access information which would ... Read more
- EPSS Score: %0.03
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-27615
SAP Manufacturing Execution versions - 15.1, 1.5.2, 15.3, 15.4, does not contain some HTTP security headers in their HTTP response. The lack of these headers in response can be exploited by the attacker to execute Cross-Site Scripting (XSS) attacks.... Read more
Affected Products : manufacturing_execution- EPSS Score: %0.36
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-27614
SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One on SAP HANA, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behaviour of the... Read more
- EPSS Score: %0.04
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-27613
Under certain conditions, SAP Business One Chef cookbook, version - 9.2, 9.3, 10.0, used to install SAP Business One, allows an attacker to exploit an insecure temporary folder for incoming & outgoing payroll data and to access information which would oth... Read more
Affected Products : chef_business-one-cookbook- EPSS Score: %0.04
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-27612
In specific situations SAP GUI for Windows until and including 7.60 PL9, 7.70 PL0, forwards a user to specific malicious website which could contain malware or might lead to phishing attacks to steal credentials of the victim.... Read more
Affected Products : gui_for_windows- EPSS Score: %0.18
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2021-27611
SAP NetWeaver AS ABAP, versions - 700, 701, 702, 730, 731, allow a high privileged attacker to inject malicious code by executing an ABAP report when the attacker has access to the local SAP system. The attacker could then get access to data, overwrite th... Read more
Affected Products : netweaver_application_server_abap- EPSS Score: %0.11
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27610
SAP NetWeaver ABAP Server and ABAP Platform, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 804, does not create information about internal and external RFC user in consistent and distinguished format, which could lead to improper authe... Read more
- EPSS Score: %0.55
- Published: Jun. 16, 2021
- Modified: Nov. 21, 2024