Business Application Software Integrated Solution SAP Business Application Software Integrated Solution

Do you want an email whenever new security vulnerabilities are reported in SAP Business Application Software Integrated Solution?

By the Year

In 2024 there have been 0 vulnerabilities in SAP Business Application Software Integrated Solution . Business Application Software Integrated Solution did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 1 8.80
2018 3 8.53

It may take a day or so for new Business Application Software Integrated Solution vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent SAP Business Application Software Integrated Solution Security Vulnerabilities

ABAP BASIS function modules INST_CREATE_R3_RFC_DEST

CVE-2019-0279 8.8 - High - April 10, 2019

ABAP BASIS function modules INST_CREATE_R3_RFC_DEST, INST_CREATE_TCPIP_RFCDEST, and INST_CREATE_TCPIP_RFC_DEST in SAP BASIS (fixed in versions 7.0 to 7.02, 7.10 to 7.30, 7.31, 7.40, 7.50 to 7.53) do not perform necessary authorization checks in all circumstances for an authenticated user, resulting in escalation of privileges.

AuthZ

Necessary authorization checks for an authenticated user, resulting in escalation of privileges, have been fixed in SAP Basis AS ABAP of SAP NetWeaver 700 to 750

CVE-2018-2494 8 - High - December 11, 2018

Necessary authorization checks for an authenticated user, resulting in escalation of privileges, have been fixed in SAP Basis AS ABAP of SAP NetWeaver 700 to 750, from 750 onwards delivered as ABAP Platform.

AuthZ

ABAP File Interface in, SAP BASIS, from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52

CVE-2018-2367 8.8 - High - March 01, 2018

ABAP File Interface in, SAP BASIS, from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs.

Directory traversal

SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code

CVE-2018-2363 8.8 - High - January 09, 2018

SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code that allows you to execute arbitrary program code of the user's choice. A malicious user can therefore control the behaviour of the system or can potentially escalate privileges by executing malicious code without legitimate credentials.

Code Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for SAP Netweaver or by SAP? Click the Watch button to subscribe.

SAP
Vendor

subscribe