Vulnerabilities (CVE)

Filtered by vendor Sap Subscribe
Filtered by product Cloud Connector
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-49578 1 Sap 1 Cloud Connector 2023-12-15 N/A 3.5 LOW
SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity  of the application.
CVE-2021-33693 1 Sap 1 Cloud Connector 2023-12-10 7.7 HIGH 6.8 MEDIUM
SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes that could potentially lead to OS command execution.
CVE-2021-33695 1 Sap 1 Cloud Connector 2023-12-10 6.4 MEDIUM 9.1 CRITICAL
Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate.
CVE-2021-33694 1 Sap 1 Cloud Connector 2023-12-10 3.5 LOW 4.8 MEDIUM
SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and when accessed, could be executed in the application, resulting in Stored Cross-Site Scripting.
CVE-2021-33692 1 Sap 1 Cloud Connector 2023-12-10 5.0 MEDIUM 7.5 HIGH
SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be tricked to inject special elements such as '..' and '/' separators, for attackers to escape outside of the restricted location to access files or directories.
CVE-2019-0247 1 Sap 1 Cloud Connector 2023-12-10 7.5 HIGH 9.8 CRITICAL
SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
CVE-2019-0246 1 Sap 1 Cloud Connector 2023-12-10 7.5 HIGH 9.8 CRITICAL
SAP Cloud Connector, before version 2.11.3, does not perform any authentication checks for functionalities that require user identity.