PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 1633

of 82

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

The unauthenticated attacker in NetWeaver AS Java Logon application - version 7.50, can brute force the login functionality to identify the legitimate user ids. This will have an impact on confidentiality but there is no other impact on integrity or availability.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

Under certain condition SAP NetWeaver Application Server ABAP - versions KERNEL 722, KERNEL 7.53, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.94, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT, allows an unauthenticated attacker to access the unintended data due to the lack of restrictions applied which may lead to low impact in confidentiality and no impact on the integrity and availability of the application.

Published:   Updated:

Vulnerability Type: Authorization

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38

SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the X-FRAME-OPTIONS response header is not implemented, allowing an unauthenticated attacker to attempt clickjacking, which could result in disclosure or modification of information.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

SAP NetWeaver AS Java (GRMG Heartbeat application) - version 7.50, allows an attacker to send a crafted request from a vulnerable web application, causing limited impact on confidentiality and integrity of the application.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

The Statutory Reporting application has a vulnerable file storage location, potentially enabling low privileged attacker to read server files with minimal impact on confidentiality.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

SAP BusinessObjects Web Intelligence - version 420, has a URL with parameter that could be vulnerable to XSS attack. The attacker could send a malicious link to a user that would possibly allow an attacker to retrieve the sensitive information.

Published:   Updated:

Vulnerability Type: Authorization

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

S/4HANA Manage (Withholding Tax Items) - version 106, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges which has low impact on the confidentiality and integrity of the application.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

SAP Business One (B1i) - version 10.0, allows an authorized attacker to retrieve the details stack trace of the fault message to conduct the XXE injection, which will lead to information disclosure. After successful exploitation, an attacker can cause limited impact on the confidentiality and no impact to the integrity and availability.

Published:   Updated:

Vulnerability Type: Xxe

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

SAP PowerDesigner Client - version 16.7, does not sufficiently validate BPMN2 XML document imported from an untrusted source. As a result, URLs of external entities in BPMN2 file, although not used, would be accessed during import. A successful attack could impact availability of SAP PowerDesigner Client.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An attacker with standard privileges on macOS when requesting administrator privileges from the application can submit input which causes a buffer overflow resulting in a crash of the application. This could make the application unavailable and allow reading or modification of data.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.9

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Gnu, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

Published:   Updated:

Vulnerability Type: Authorization

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

S4CORE (Manage Purchase Contracts App) - versions 102, 103, 104, 105, 106, 107, does not perform necessary authorization checks for an authenticated user. This could allow an attacker to perform unintended actions resulting in escalation of privileges which has low impact on confidentiality and integrity with no impact on availibility of the system.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

SAP NetWeaver AS ABAP (applications based on Unified Rendering) - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 702, SAP_BASIS 731, allows an attacker to inject JavaScript code that can be executed in the web-application. An attacker could thereby control the behavior of this web-application.

Published:   Updated:

Vulnerability Type: Directory traversal

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.1

SAP BusinessObjects Suite Installer - version 420, 430, allows an attacker within the network to create a directory under temporary directory and link it to a directory with operating system files. On successful exploitation the attacker can delete all the operating system files causing a limited impact on integrity and completely compromising the availability of the system.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Sap
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.9

SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability.

Published:   Updated:

Vulnerability Type: Default credentials

Vendor(s):  Sap
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.3

SAP PowerDesigner Client - version 16.7, allows an unauthenticated attacker to inject VBScript code in a document and have it opened by an unsuspecting user, to have it executed by the application on behalf of the user. The application has a security option to disable or prompt users before untrusted scripts are executed, but this is not set as default.

Published:   Updated:

Vulnerability Type: Authorization

Vendor(s):  Sap
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.

of 82