SAP

Business Warehouse

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 08.04.2025 07:14:07
  • Last modified 08.04.2025 18:13:53

SAP ERP BW Business Content is vulnerable to OS Command Injection through certain function modules. These function modules, when executed with elevated privileges, improperly handle user input, allowing attacker to inject arbitrary OS commands. This ...

  • EPSS 0.09%
  • Published 11.07.2023 03:15:09
  • Last modified 21.11.2024 08:06:22

The SAP BW BICS communication layer in SAP Business Warehouse and SAP BW/4HANA - version SAP_BW 730, SAP_BW 731, SAP_BW 740, SAP_BW 730, SAP_BW 750, DW4CORE 100, DW4CORE 200, DW4CORE 300, may expose unauthorized cell values to the data response. To b...

Exploit
  • EPSS 0.42%
  • Published 12.01.2021 15:15:16
  • Last modified 21.11.2024 05:48:26

The BW Database Interface does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges that allows the user to practically read out any database table.

Exploit
  • EPSS 1.43%
  • Published 12.01.2021 15:15:15
  • Last modified 21.11.2024 05:48:25

The BW Database Interface allows an attacker with low privileges to execute any crafted database queries, exposing the backend database. An attacker can include their own SQL commands which the database will execute without properly sanitizing the un...

Exploit
  • EPSS 0.7%
  • Published 12.01.2021 15:15:15
  • Last modified 21.11.2024 05:48:25

SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attac...

  • EPSS 2%
  • Published 09.12.2020 17:15:31
  • Last modified 21.11.2024 05:20:22

SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute ...