cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-27618,https://securityvulnerability.io/vulnerability/CVE-2021-27618,,"The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not check the file type extension of the file uploaded from local source. An attacker could craft a malicious file and upload it to the application, which could lead to denial of service and impact the availability of the application.",SAP,SAP Process Integration (integration Builder Framework),4.9,MEDIUM,0.0008099999977275729,false,false,false,false,,false,false,2021-05-11T14:19:33.000Z,0 CVE-2021-27617,https://securityvulnerability.io/vulnerability/CVE-2021-27617,,"The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and parsed by the application, could lead to Denial-of-service conditions due to consumption of a large amount of system memory, thus highly impacting system availability.",SAP,SAP Process Integration (integration Builder Framework),4.9,MEDIUM,0.0008500000112690032,false,false,false,false,,false,false,2021-05-11T14:19:33.000Z,0 CVE-2021-27599,https://securityvulnerability.io/vulnerability/CVE-2021-27599,,"SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Integration Builder Framework), versions - 7.10, 7.30, 7.31, 7.40, 7.50, allows an attacker to access information under certain conditions, which would otherwise be restricted.",SAP,SAP Process Integration (integration Builder Framework),6.5,MEDIUM,0.0006500000017695129,false,false,false,false,,false,false,2021-04-14T14:23:01.000Z,0