Latest CVE Feed
-
7.5
HIGHCVE-2021-27633
SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without spe... Read more
Affected Products : netweaver_abap- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27632
SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without sp... Read more
Affected Products : netweaver_as_abap- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27631
SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without sp... Read more
Affected Products : netweaver_as_abap- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27630
SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without sp... Read more
Affected Products : netweaver_as_abap- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27629
SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without sp... Read more
Affected Products : netweaver_as_abap- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27628
SAP NetWeaver ABAP Server and ABAP Platform (Dispatcher), versions - KRNL32NUC - 7.22,7.22EXT, KRNL32UC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allo... Read more
Affected Products : netweaver_as_abap- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27627
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27626
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27625
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27624
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27623
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27622
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-27621
Information Disclosure vulnerability in UserAdmin application in SAP NetWeaver Application Server for Java, versions - 7.11,7.20,7.30,7.31,7.40 and 7.50 allows attackers to access restricted information by entering malicious server name.... Read more
- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-27620
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in m... Read more
Affected Products : netweaver_as_internet_graphics_server- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-27619
SAP Commerce (Backoffice Search), versions - 1808, 1811, 1905, 2005, 2011, allows a low privileged user to search for attributes which are not supposed to be displayed to them. Although the search results are masked, the user can iteratively enter one cha... Read more
Affected Products : commerce- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-27618
The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not check the file type extension of the file uploaded from local source. An attacker could craft a malicious file and upload it to the ... Read more
Affected Products : netweaver_process_integration- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-27617
The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and pars... Read more
Affected Products : netweaver_process_integration- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-27616
Under certain conditions, SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One for SAP HANA, allows an attacker to exploit an insecure temporary backup path and to access information which would ... Read more
- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-27615
SAP Manufacturing Execution versions - 15.1, 1.5.2, 15.3, 15.4, does not contain some HTTP security headers in their HTTP response. The lack of these headers in response can be exploited by the attacker to execute Cross-Site Scripting (XSS) attacks.... Read more
Affected Products : manufacturing_execution- Published: Jun. 09, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-27614
SAP Business One Hana Chef Cookbook, versions - 8.82, 9.0, 9.1, 9.2, 9.3, 10.0, used to install SAP Business One on SAP HANA, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behaviour of the... Read more
- Published: May. 11, 2021
- Modified: Nov. 21, 2024