Vulnerabilities (CVE)

Filtered by vendor Sap Subscribe
Total 1485 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-6308 1 Sap 1 Businessobjects Business Intelligence Platform 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability.
CVE-2020-6307 1 Sap 1 Basis 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Automated Note Search Tool (update provided in SAP Basis 7.0, 7.01, 7.02, 7.31, 7.4, 7.5, 7.51, 7.52, 7.53 and 7.54) does not perform sufficient authorization checks leading to the reading of sensitive information.
CVE-2020-6306 1 Sap 1 Leasing 2024-11-21 4.0 MEDIUM 2.7 LOW
Missing authorization check in a transaction within SAP Leasing (update provided in SAP_APPL 6.18, EA-APPL 6.0, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16 and 6.17).
CVE-2020-6305 1 Sap 1 Process Integration 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
PI Rest Adapter of SAP Process Integration (update provided in SAP_XIAF 7.31, 7.40, 7.50) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
CVE-2020-6304 1 Sap 5 Netweaver Internet Communication Manager \(kernel\), Netweaver Internet Communication Manager \(krnl32nuc\), Netweaver Internet Communication Manager \(krnl32uc\) and 2 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
Improper input validation in SAP NetWeaver Internet Communication Manager (update provided in KRNL32NUC & KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT KRNL64NUC & KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49 KERNEL 7.21, 7.49, 7.53) allows an attacker to prevent users from accessing its services through a denial of service.
CVE-2020-6303 1 Sap 1 Disclosure Management 2024-11-21 3.5 LOW 5.4 MEDIUM
SAP Disclosure Management, before version 10.1, does not validate user input properly in specific use cases leading to Cross-Site Scripting.
CVE-2020-6302 1 Sap 1 Commerce 2024-11-21 7.5 HIGH 8.1 HIGH
SAP Commerce versions 6.7, 1808, 1811, 1905, 2005 contains the jSession ID in the backoffice URL when the application is loaded initially. An attacker can get this session ID via shoulder surfing or man in the middle attack and subsequently get access to admin user accounts, leading to Session Fixation and complete compromise of the confidentiality, integrity and availability of the application.
CVE-2020-6301 1 Sap 1 Hcm Travel Management 2024-11-21 5.5 MEDIUM 8.1 HIGH
SAP ERP (HCM Travel Management), versions - 600, 602, 603, 604, 605, 606, 607, 608, allows an authenticated but unauthorized attacker to read, modify and settle trips, resulting in escalation of privileges, due to Missing Authorization Check.
CVE-2020-6300 1 Sap 1 Businessobjects Business Intelligence Platform 2024-11-21 3.5 LOW 4.8 MEDIUM
SAP Business Objects Business Intelligence Platform (Central Management Console), versions- 4.2, 4.3, allows an attacker with administrator rights can use the web application to send malicious code to a different end user (victim), as it does not sufficiently encode user-controlled inputs for RecycleBin, resulting in Stored Cross-Site Scripting (XSS) vulnerability.
CVE-2020-6299 1 Sap 2 Abap Platform, Netweaver Application Server Abap 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.
CVE-2020-6298 1 Sap 1 Generic Market Data 2024-11-21 5.5 MEDIUM 8.1 HIGH
SAP Banking Services (Generic Market Data), versions - 400, 450, 500, allows an unauthorized user to display protected Business Partner Generic Market Data (GMD) and change related GMD key figure values, due to Missing Authorization Check.
CVE-2020-6297 1 Sap 1 Data Intelligence 2024-11-21 2.1 LOW 4.4 MEDIUM
Under certain conditions the upgrade of SAP Data Hub 2.7 to SAP Data Intelligence, version - 3.0, allows an attacker to access confidential system configuration information, that should otherwise be restricted, leading to Information Disclosure.
CVE-2020-6296 1 Sap 2 Abap Platform, Netweaver Application Server Abap 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.
CVE-2020-6295 1 Sap 1 Adaptive Server Enterprise 2024-11-21 4.6 MEDIUM 7.8 HIGH
Under certain conditions the SAP Adaptive Server Enterprise, version 16.0, allows an attacker to access encrypted sensitive and confidential information through publicly readable installation log files leading to a compromise of the installed Cockpit. This compromise could enable the attacker to view, modify and/or make unavailable any data associated with the Cockpit, leading to Information Disclosure.
CVE-2020-6294 2 Opengroup, Sap 2 Unix, Businessobjects Business Intelligence Platform 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
Xvfb of SAP Business Objects Business Intelligence Platform, versions - 4.2, 4.3, platform on Unix does not perform any authentication checks for functionalities that require user identity.
CVE-2020-6293 1 Sap 1 Netweaver Knowledge Management 2024-11-21 6.4 MEDIUM 6.5 MEDIUM
SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to upload a malicious file and also to access, modify or make unavailable existing files but the impact is limited to the files themselves and is restricted by other policies such as access control lists and other upload file size restrictions, leading to Unrestricted File Upload.
CVE-2020-6292 1 Sap 1 Disclosure Management 2024-11-21 6.5 MEDIUM 8.8 HIGH
Logout mechanism in SAP Disclosure Management, version 10.1, does not invalidate one of the session cookies, leading to Insufficient Session Expiration.
CVE-2020-6291 1 Sap 1 Disclosure Management 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP Disclosure Management, version 10.1, session mechanism does not have expiration data set therefore allows unlimited access after authenticating once, leading to Insufficient Session Expiration
CVE-2020-6290 1 Sap 1 Disclosure Management 2024-11-21 6.8 MEDIUM 6.3 MEDIUM
SAP Disclosure Management, version 10.1, is vulnerable to Session Fixation attacks wherein the attacker tricks the user into using a specific session ID.
CVE-2020-6289 1 Sap 1 Disclosure Management 2024-11-21 6.8 MEDIUM 8.8 HIGH
SAP Disclosure Management, version 10.1, had insufficient protection against Cross-Site Request Forgery, which could be used to trick user in to browsing malicious site.