{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T19:40:35.104","vulnerabilities":[{"cve":{"id":"CVE-2021-33663","sourceIdentifier":"cna@sap.com","published":"2021-06-09T14:15:10.010","lastModified":"2024-11-21T06:09:18.563","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SAP NetWeaver AS ABAP, versions - KRNL32NUC - 7.22,7.22EXT, KRNL32UC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83,7.84, allows an unauthorized attacker to insert cleartext commands due to improper restriction of I/O buffering into encrypted SMTP sessions over the network which can partially impact the integrity of the application."},{"lang":"es","value":"SAP NetWeaver AS ABAP, versiones - KRNL32NUC - 7.22,7.22EXT, KRNL32UC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT, 7.49, KRNL64UC - 8.04,7.22,7.22EXT, 7.49,7.53,7.73, KERNEL - 7.22,8.04 , 7.49,7.53,7.73,7.77,7.81,7.82,7.83,7.84, permite a un atacante no autorizado insertar comandos de texto sin cifrar debido a una restricción inapropiada del almacenamiento en búfer de E/S en sesiones SMTP cifradas a través de la red, lo que puede impactar parcialmente la integridad de la aplicación"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV30":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.22:*:*:*:*:*:*:*","matchCriteriaId":"6C07042F-C47F-441E-AB32-B58A066909E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.49:*:*:*:*:*:*:*","matchCriteriaId":"5370493B-8917-4ACC-9C4B-043BEF7CCCA8"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.53:*:*:*:*:*:*:*","matchCriteriaId":"DBC44C62-0BFD-4170-B094-C82DEA473938"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.73:*:*:*:*:*:*:*","matchCriteriaId":"0AE96595-DED1-447A-BD93-2D448356B479"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.77:*:*:*:*:*:*:*","matchCriteriaId":"208F59B2-7D79-4E0E-97DA-AEB9976C8EEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.81:*:*:*:*:*:*:*","matchCriteriaId":"F39863DC-8CF3-4FB9-8FBF-1776791D701F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.82:*:*:*:*:*:*:*","matchCriteriaId":"CAA2FFEC-D7AE-4F3E-8CCF-29ECB9D38107"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.83:*:*:*:*:*:*:*","matchCriteriaId":"45DF564C-F6DB-4DDD-A196-09FAD239F159"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.84:*:*:*:*:*:*:*","matchCriteriaId":"8FB964D8-83B6-4DCE-B51D-CBD8766A8FBE"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:kernel_8.04:*:*:*:*:*:*:*","matchCriteriaId":"379FDFC8-947E-4D09-A9DD-4B3F7481F648"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl32nuc_7.22:*:*:*:*:*:*:*","matchCriteriaId":"79281E01-F573-4296-BC08-C26BC1D28619"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl32nuc_7.22ext:*:*:*:*:*:*:*","matchCriteriaId":"9E12EF81-509D-4BC5-8503-2522AA550C46"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl32uc_7.22:*:*:*:*:*:*:*","matchCriteriaId":"A1E9A9E7-8866-4BAF-841B-D4DF142C25DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl32uc_7.22ext:*:*:*:*:*:*:*","matchCriteriaId":"FF946307-728B-44D6-85D8-0CE8005E5D35"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64nuc_7.22:*:*:*:*:*:*:*","matchCriteriaId":"C2D5BECF-C4BA-44C7-9AD7-56865DD9AD60"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64nuc_7.22ext:*:*:*:*:*:*:*","matchCriteriaId":"AB7E91DE-A52F-4E57-8397-7670E30C8B5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64nuc_7.49:*:*:*:*:*:*:*","matchCriteriaId":"AB478A3C-4DD5-4F42-B2F1-9B7CCBA1B995"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.22:*:*:*:*:*:*:*","matchCriteriaId":"23257C18-B75C-471C-9EAF-1E86DEE845FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.22ext:*:*:*:*:*:*:*","matchCriteriaId":"A01290A1-3C1B-4AF7-9284-C164BDEC85A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.49:*:*:*:*:*:*:*","matchCriteriaId":"6D5F8B53-ECAD-4CD2-8F91-25112569C056"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.53:*:*:*:*:*:*:*","matchCriteriaId":"ADE160BD-659F-4517-B625-61CFB2FBD456"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.73:*:*:*:*:*:*:*","matchCriteriaId":"DD525F35-6130-45EC-85ED-7ED8E4B37BDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_8.04:*:*:*:*:*:*:*","matchCriteriaId":"88CD861F-08FB-4CE1-923C-79D1480A2259"}]}]}],"references":[{"url":"https://launchpad.support.sap.com/#/notes/3030604","source":"cna@sap.com","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999","source":"cna@sap.com","tags":["Vendor Advisory"]},{"url":"https://launchpad.support.sap.com/#/notes/3030604","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Vendor Advisory"]},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}