
CVE-2021-27625 – SAP NetWeaver ABAP IGS Memory Corruption
https://notcve.org/view.php?id=CVE-2021-27625
09 Jun 2021 — SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method IgsData::freeMemory() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. SAP Internet Graphics Service, versio... • https://launchpad.support.sap.com/#/notes/3021050 • CWE-787: Out-of-bounds Write •

CVE-2021-27624 – SAP NetWeaver ABAP IGS Memory Corruption
https://notcve.org/view.php?id=CVE-2021-27624
09 Jun 2021 — SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CiXMLIStreamRawBuffer::readRaw () which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. SAP Internet Graphics Ser... • https://launchpad.support.sap.com/#/notes/3021050 • CWE-787: Out-of-bounds Write •

CVE-2021-27626 – SAP NetWeaver ABAP IGS Memory Corruption
https://notcve.org/view.php?id=CVE-2021-27626
09 Jun 2021 — SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CMiniXMLParser::Parse() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. SAP Internet Graphics Service, vers... • https://launchpad.support.sap.com/#/notes/3021050 • CWE-787: Out-of-bounds Write •

CVE-2021-27627 – SAP NetWeaver ABAP IGS Memory Corruption
https://notcve.org/view.php?id=CVE-2021-27627
09 Jun 2021 — SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method ChartInterpreter::DoIt() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. SAP Internet Graphics Service, ver... • https://launchpad.support.sap.com/#/notes/3021050 • CWE-787: Out-of-bounds Write •

CVE-2021-27618
https://notcve.org/view.php?id=CVE-2021-27618
11 May 2021 — The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not check the file type extension of the file uploaded from local source. An attacker could craft a malicious file and upload it to the application, which could lead to denial of service and impact the availability of the application. Integration Builder Framework de SAP Process Integration versiones - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, no comprueba la extensión del tipo de archivo d... • https://launchpad.support.sap.com/#/notes/3012021 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2021-27617
https://notcve.org/view.php?id=CVE-2021-27617
11 May 2021 — The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and parsed by the application, could lead to Denial-of-service conditions due to consumption of a large amount of system memory, thus highly impacting system availability. Integration Builder Framework de SAP Process Integration versiones - 7.10, 7.11, 7.20, 7.30, ... • https://launchpad.support.sap.com/#/notes/3012021 • CWE-20: Improper Input Validation •

CVE-2021-27604
https://notcve.org/view.php?id=CVE-2021-27604
14 Apr 2021 — In order to prevent XML External Entity vulnerability in SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Enterprise Service Repository JAVA Mappings), versions - 7.10, 7.20, 7.30, 7.31, 7.40, 7.50, SAP recommends to refer this note. A fin de impedir una vulnerabilidad de XML External Entity en SAP NetWeaver ABAP Server y ABAP Platform (Process Integration - Enterprise Service Repository JAVA Mappings), versiones - 7.10, 7.20, 7.30, 7.31, 7.40, 7.50, SAP recomienda consultar esta nota • https://launchpad.support.sap.com/#/notes/3036436 • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2021-21485
https://notcve.org/view.php?id=CVE-2021-21485
13 Apr 2021 — An unauthorized attacker may be able to entice an administrator to invoke telnet commands of an SAP NetWeaver Application Server for Java that allow the attacker to gain NTLM hashes of a privileged user. Un atacante no autorizado puede ser capaz de atraer a un administrador para que invoque comandos telnet de SAP NetWeaver Application Server para Java que permitan al atacante obtener hashes NTLM de un usuario privilegiado • https://launchpad.support.sap.com/#/notes/3001824 •

CVE-2021-21492
https://notcve.org/view.php?id=CVE-2021-21492
13 Apr 2021 — SAP NetWeaver Application Server Java(HTTP Service), versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate logon group in URLs, resulting in a content spoofing vulnerability when directory listing is enabled. SAP NetWeaver Application Server Java (HTTP Service), versiones - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, no comprueba suficientemente el grupo de inicio de sesión en las URL, resultando en una vulnerabilidad de suplantación de contenido cuando la lista de directorios es... • https://launchpad.support.sap.com/#/notes/3025637 • CWE-290: Authentication Bypass by Spoofing •

CVE-2021-21491
https://notcve.org/view.php?id=CVE-2021-21491
10 Mar 2021 — SAP Netweaver Application Server Java (Applications based on WebDynpro Java) versions 7.00, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. SAP Netweaver Application Server Java (Aplicaciones basadas en WebDynpro Java) versiones 7.00, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, permiten a un atacante redireccionar a usuarios a un sitio malicioso debido a vulnerabilidades de Reverse Tabnabbing • https://launchpad.support.sap.com/#/notes/2976947 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •