cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-44113,https://securityvulnerability.io/vulnerability/CVE-2024-44113,Authenticated Attackers Can Access Restricted Information via Missing Authorization Checks,"Due to missing authorization checks, SAP Business Warehouse (BEx Analyzer) allows an authenticated attacker to access information over the network which is otherwise restricted. On successful exploitation the attacker can enumerate information causing a limited impact on confidentiality of the application.",SAP,SAP Business Warehouse (bex Analyzer),4.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-09-10T03:04:28.683Z,0 CVE-2024-39595,https://securityvulnerability.io/vulnerability/CVE-2024-39595,SAP Business Warehouse XSS Vulnerability Allows User-Controlled Modification of Website Content,"SAP Business Warehouse - Business Planning and Simulation application does not sufficiently encode user-controlled inputs, resulting in Stored Cross-Site Scripting (XSS) vulnerability. This vulnerability allows users to modify website content and on successful exploitation, an attacker can cause low impact to the confidentiality and integrity of the application.",SAP,SAP Business Warehouse - Business Planning And Simulation,5.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-07-09T04:13:49.560Z,0 CVE-2024-39594,https://securityvulnerability.io/vulnerability/CVE-2024-39594,SAP Business Warehouse XSS Vulnerability Could Lead to Low-Impact Attacks,"SAP Business Warehouse - Business Planning and Simulation application does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. After successful exploitation, an attacker can cause low impact on the confidentiality and integrity of the application.",SAP,SAP Business Warehouse - Business Planning And Simulation,6.1,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-07-09T04:10:40.727Z,0 CVE-2023-33992,https://securityvulnerability.io/vulnerability/CVE-2023-33992,Missing Authorization Check in SAP Business Warehouse and SAP BW/4HANA,"The SAP BW BICS communication layer in SAP Business Warehouse and SAP BW/4HANA - version SAP_BW 730, SAP_BW 731, SAP_BW 740, SAP_BW 730, SAP_BW 750, DW4CORE 100, DW4CORE 200, DW4CORE 300, may expose unauthorized cell values to the data response. To be able to exploit this, the user still needs authorizations on the query as well as on the keyfigure/measure level. The missing check only affects the data level. ",SAP,SAP Business Warehouse And SAP Bw/4hana,4.5,MEDIUM,0.0007999999797903001,false,false,false,false,,false,false,2023-07-11T03:15:00.000Z,0 CVE-2021-21466,https://securityvulnerability.io/vulnerability/CVE-2021-21466,,"SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service.",SAP,"SAP Business Warehouse,SAP Bw/4hana",9.9,CRITICAL,0.022789999842643738,false,false,false,false,,false,false,2021-01-12T14:42:39.000Z,0 CVE-2021-21465,https://securityvulnerability.io/vulnerability/CVE-2021-21465,,"The BW Database Interface allows an attacker with low privileges to execute any crafted database queries, exposing the backend database. An attacker can include their own SQL commands which the database will execute without properly sanitizing the untrusted data leading to SQL injection vulnerability which can fully compromise the affected SAP system.",SAP,SAP Business Warehouse,9.9,CRITICAL,0.009399999864399433,false,false,false,false,,false,false,2021-01-12T14:40:57.000Z,0 CVE-2021-21468,https://securityvulnerability.io/vulnerability/CVE-2021-21468,,"The BW Database Interface does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges that allows the user to practically read out any database table.",SAP,SAP Business Warehouse,6.5,MEDIUM,0.0026400000788271427,false,false,false,false,,false,false,2021-01-12T14:40:53.000Z,0 CVE-2020-26838,https://securityvulnerability.io/vulnerability/CVE-2020-26838,,"SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.",SAP,"SAP Business Warehouse,SAP Bw4hana",9.1,CRITICAL,0.0011599999852478504,false,false,false,false,,false,false,2020-12-09T16:31:14.000Z,0 CVE-2017-16685,https://securityvulnerability.io/vulnerability/CVE-2017-16685,,"Cross-Site scripting (XSS) in SAP Business Warehouse Universal Data Integration, from 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, due to insufficient encoding of user controlled inputs.",SAP,SAP Business Warehouse Universal Data Integration,6.1,MEDIUM,0.0010499999625608325,false,false,false,false,,false,false,2017-12-12T00:00:00.000Z,0