Vulnerabilities (CVE)

Filtered by vendor Sap Subscribe
Total 1485 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-39799 1 Sap 1 Netweaver Application Server Abap 2024-11-21 N/A 6.1 MEDIUM
An attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, resulting in reflected cross-site scripting attack. This could lead to stealing session information and impersonating the affected user.
CVE-2022-39015 1 Sap 1 Business Objects Business Intelligence Platform 2024-11-21 N/A 6.5 MEDIUM
Under certain conditions, BOE AdminTools/ BOE SDK allows an attacker to access information which would otherwise be restricted.
CVE-2022-39014 1 Sap 1 Businessobjects Business Intelligence Platform 2024-11-21 N/A 5.3 MEDIUM
Under certain conditions SAP BusinessObjects Business Intelligence Platform Central Management Console (CMC) - version 430, allows an attacker to access certain unencrypted sensitive parameters which would otherwise be restricted.
CVE-2022-39013 1 Sap 1 Business Objects Business Intelligence Platform 2024-11-21 N/A 7.6 HIGH
Under certain conditions an authenticated attacker can get access to OS credentials. Getting access to OS credentials enables the attacker to modify system data and make the system unavailable leading to high impact on confidentiality and low impact on integrity and availability of the application.
CVE-2022-35299 1 Sap 2 Sap Iq, Sql Anywhere 2024-11-21 N/A 9.8 CRITICAL
SAP SQL Anywhere - version 17.0, and SAP IQ - version 16.1, allows an attacker to leverage logical errors in memory management to cause a memory corruption, such as Stack-based buffer overflow.
CVE-2022-35298 1 Sap 1 Netweaver Enterprise Portal 2024-11-21 N/A 6.1 MEDIUM
SAP NetWeaver Enterprise Portal (KMC) - version 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability. KMC servlet is vulnerable to XSS attack. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victim’s web browser session.
CVE-2022-35297 1 Sap 1 Enable Now 2024-11-21 N/A 5.4 MEDIUM
The application SAP Enable Now does not sufficiently encode user-controlled inputs over the network before it is placed in the output being served to other users, thereby expanding the attack scope, resulting in Stored Cross-Site Scripting (XSS) vulnerability leading to limited impact on Confidentiality, Integrity and Availability.
CVE-2022-35296 1 Sap 1 Businessobjects Business Intelligence 2024-11-21 N/A 4.9 MEDIUM
Under certain conditions, the application SAP BusinessObjects Business Intelligence Platform (Version Management System) exposes sensitive information to an actor over the network with high privileges that is not explicitly authorized to have access to that information, leading to a high impact on Confidentiality.
CVE-2022-35295 1 Sap 1 Host Agent 2024-11-21 N/A 4.9 MEDIUM
In SAP Host Agent (SAPOSCOL) - version 7.22, an attacker may use files created by saposcol to escalate privileges for themselves.
CVE-2022-35294 1 Sap 1 Netweaver Application Server Abap 2024-11-21 N/A 5.4 MEDIUM
An attacker with basic business user privileges could craft and upload a malicious file to SAP NetWeaver Application Server ABAP, which is then downloaded and viewed by other users resulting in a stored Cross-Site-Scripting attack. This could lead to information disclosure including stealing authentication information and impersonating the affected user.
CVE-2022-35293 1 Sap 1 Enable Now Manager 2024-11-21 N/A 9.1 CRITICAL
Due to insecure session management, SAP Enable Now allows an unauthenticated attacker to gain access to user's account. On successful exploitation, an attacker can view or modify user data causing limited impact on confidentiality and integrity of the application.
CVE-2022-35292 1 Sap 1 Business One 2024-11-21 N/A 7.8 HIGH
In SAP Business One application when a service is created, the executable path contains spaces and isn’t enclosed within quotes, leading to a vulnerability known as Unquoted Service Path which allows a user to gain SYSTEM privileges. If the service is exploited by adversaries, it can be used to gain privileged permissions on a system or network leading to high impact on Confidentiality, Integrity, and Availability.
CVE-2022-35291 1 Sap 1 Successfactors Mobile 2024-11-21 N/A 8.1 HIGH
Due to misconfigured application endpoints, SAP SuccessFactors attachment APIs allow attackers with user privileges to perform activities with admin privileges over the network. These APIs were consumed in the SF Mobile application for Time Off, Time Sheet, EC Workflow, and Benefits. On successful exploitation, the attacker can read/write attachments. Thus, compromising the confidentiality and integrity of the application
CVE-2022-35290 1 Sap 1 Authenticator 2024-11-21 N/A 7.5 HIGH
Under certain conditions SAP Authenticator for Android allows an attacker to access information which would otherwise be restricted.
CVE-2022-35228 1 Sap 1 Businessobjects Business Intelligence Platform 2024-11-21 6.8 MEDIUM 8.8 HIGH
SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise the application.
CVE-2022-35227 1 Sap 1 Netweaver Enterprise Portal 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.
CVE-2022-35226 1 Sap 1 Data Services 2024-11-21 N/A 6.1 MEDIUM
SAP Data Services Management allows an attacker to copy the data from a request and echoed into the application's immediate response, it will lead to a Cross-Site Scripting vulnerability. The attacker would have to log in to the management console to perform such as an attack, only few of the pages are vulnerable in the DS management console.
CVE-2022-35225 1 Sap 1 Netweaver Enterprise Portal 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs over the network, resulting in reflected Cross-Site Scripting (XSS) vulnerability, therefore changing the scope of the attack. This leads to limited impact on confidentiality and integrity of data.
CVE-2022-35224 1 Sap 1 Enterprise Portal 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SAP Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This attack can be used to non-permanently deface or modify portal content. The execution of script content by a victim registered on the portal could compromise the confidentiality and integrity of victim?s web browser session.
CVE-2022-35172 1 Sap 1 Netweaver Enterprise Portal 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability.