Vulnerabilities (CVE)

Filtered by vendor Sap Subscribe
Total 1485 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-26820 1 Sap 1 Netweaver Application Server Java 2024-11-21 9.0 HIGH 7.2 HIGH
SAP NetWeaver AS JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker who is authenticated as an administrator to use the administrator console, to expose unauthenticated access to the file system and upload a malicious file. The attacker or another user can then use a separate mechanism to execute OS commands through the uploaded file leading to Privilege Escalation and completely compromise the confidentiality, integrity and availability of the server operating system and any application running on it.
CVE-2020-26819 1 Sap 1 Netweaver Application Server Abap 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP NetWeaver AS ABAP (Web Dynpro), versions - 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, that allows them to read and delete database logfiles because of Improper Access Control.
CVE-2020-26818 1 Sap 1 Netweaver Application Server Abap 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP NetWeaver AS ABAP (Web Dynpro), versions - 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, which reveals sensitive system information that would otherwise be restricted to highly privileged users because of missing authorization, resulting in Information Disclosure.
CVE-2020-26817 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 6.8 MEDIUM 7.8 HIGH
SAP 3D Visual Enterprise Viewer, version - 9, allows an user to open manipulated HPGL file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
CVE-2020-26816 1 Sap 1 Netweaver Application Server Java 2024-11-21 2.7 LOW 4.5 MEDIUM
SAP AS JAVA (Key Storage Service), versions - 7.10, 7.11, 7.20 ,7.30, 7.31, 7.40, 7.50, has the key material which is stored in the SAP NetWeaver AS Java Key Storage service stored in the database in the DER encoded format and is not encrypted. This enables an attacker who has administrator access to the SAP NetWeaver AS Java to decode the keys because of missing encryption and get some application data and client credentials of adjacent systems. This highly impacts Confidentiality as information disclosed could contain client credentials of adjacent systems.
CVE-2020-26815 1 Sap 1 Fiori Launchpad \(news Tile Application\) 2024-11-21 5.0 MEDIUM 8.6 HIGH
SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to send a crafted request to a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network to retrieve sensitive / confidential resources which are otherwise restricted for internal usage only, resulting in a Server-Side Request Forgery vulnerability.
CVE-2020-26814 1 Sap 1 Process Integration \(pgp Module - Business-to-business Add On\) 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
SAP Process Integration (PGP Module - Business-to-Business Add On), version - 1.0, allows an attacker to read PGP Keys under certain conditions in the PGP Module of Business-to-Business Add-On, these keys can then be used to read messages processed by the module leading to Information Disclosure.
CVE-2020-26811 1 Sap 1 Commerce Cloud \(accelerator Payment Mock\) 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability.
CVE-2020-26810 1 Sap 1 Commerce Cloud \(accelerator Payment Mock\) 2024-11-21 5.0 MEDIUM 7.5 HIGH
SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity.
CVE-2020-26809 1 Sap 1 Commerce Cloud 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
SAP Commerce Cloud, versions- 1808,1811,1905,2005, allows an attacker to bypass existing authentication and permission checks via the '/medias' endpoint hence gaining access to Secure Media folders. This folder could contain sensitive files that results in disclosure of sensitive information and impact system configuration confidentiality.
CVE-2020-26808 1 Sap 2 Sap As Abap\(dmis\), Sap S4 Hana\(dmis\) 2024-11-21 6.5 MEDIUM 7.2 HIGH
SAP AS ABAP(DMIS), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA(DMIS), versions - 101, 102, 103, 104, 105, allows an authenticated attacker to inject arbitrary code into function module leading to code injection that can be executed in the application which affects the confidentiality, availability and integrity of the application.
CVE-2020-26807 1 Sap 1 Erp Client For E-bilanz 2024-11-21 2.1 LOW 3.3 LOW
SAP ERP Client for E-Bilanz, version - 1.0, installation sets Incorrect default filesystem permissions are set in its installation folder which allows anyone to modify the files in the folder.
CVE-2019-0405 1 Sap 1 Enable Now 2024-11-21 5.0 MEDIUM 7.5 HIGH
SAP Enable Now, before version 1911, leaks information about the existence of a particular user which can be used to construct a list of users, leading to a user enumeration vulnerability and Information Disclosure.
CVE-2019-0404 1 Sap 1 Enable Now 2024-11-21 5.0 MEDIUM 7.5 HIGH
SAP Enable Now, before version 1911, leaks information about network configuration in the server error messages, leading to Information Disclosure.
CVE-2019-0403 1 Sap 1 Enable Now 2024-11-21 7.5 HIGH 9.8 CRITICAL
SAP Enable Now, before version 1911, allows an attacker to input commands into the CSV files, which will be executed when opened, leading to CSV Command Injection.
CVE-2019-0402 1 Sap 1 Adaptive Server Enterprise 2024-11-21 2.1 LOW 4.4 MEDIUM
SAP Adaptive Server Enterprise, before versions 15.7 and 16.0, under certain conditions exposes some sensitive information to the admin, leading to Information Disclosure.
CVE-2019-0399 1 Sap 1 Portfolio And Project Management 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
SAP Portfolio and Project Management, before versions S4CORE 102, 103, EPPM 100 and CPRXRPM 500_702, 600_740, 610_740; unintentionally allows a user to discover accounting information of the Projects in Project dashboard, leading to Information Disclosure.
CVE-2019-0398 1 Sap 1 Businessobjects Business Intelligence Platform 2024-11-21 6.8 MEDIUM 8.8 HIGH
Due to insufficient CSRF protection, SAP BusinessObjects Business Intelligence Platform (Monitoring Application), before versions 4.1, 4.2 and 4.3, may lead to an authenticated user to send unintended request to the web server, leading to Cross Site Request Forgery.
CVE-2019-0396 1 Sap 1 Businessobjects Business Intelligence Platform 2024-11-21 5.5 MEDIUM 7.1 HIGH
SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface), corrected in versions 4.1 and 4.2, does not sufficiently validate an XML document accepted from an untrusted source. An attacker can craft a message that contains malicious elements that will not be correctly filtered by Web Intelligence HTML interface in some specific workflows.
CVE-2019-0395 1 Sap 1 Businessobjects Business Intelligence Platform 2024-11-21 3.5 LOW 5.4 MEDIUM
SAP BusinessObjects Business Intelligence Platform (Fiori BI Launchpad), before version 4.2, allows execution of JavaScript in a text module in Fiori BI Launchpad, leading to Stored Cross Site Scripting vulnerability.