{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T18:44:22.066","vulnerabilities":[{"cve":{"id":"CVE-2021-42064","sourceIdentifier":"cna@sap.com","published":"2021-12-14T16:15:09.303","lastModified":"2024-11-21T06:27:10.540","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"If configured to use an Oracle database and if a query is created using the flexible search java api with a parameterized \"in\" clause, SAP Commerce - versions 1905, 2005, 2105, 2011, allows attacker to execute crafted database queries, exposing backend database. The vulnerability is present if the parameterized \"in\" clause accepts more than 1000 values."},{"lang":"es","value":"Si es configurado para usar una base de datos Oracle y si se crea una consulta usando la api java de búsqueda flexible con una cláusula \"in\" parametrizada, SAP Commerce - versiones 1905, 2005, 2105, 2011, permite al atacante ejecutar consultas de base de datos diseñadas, exponiendo la base de datos del backend. La vulnerabilidad está presente si la cláusula \"in\" parametrizada acepta más de 1000 valores"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:1905:*:*:*:*:*:*:*","matchCriteriaId":"F665F648-5C35-4EC8-8064-8ED139C8813C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:2005:*:*:*:*:*:*:*","matchCriteriaId":"C788164A-7724-4CB1-8ADC-B05ADE595020"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:2011:*:*:*:*:*:*:*","matchCriteriaId":"8DE31C0C-31D7-468E-B1D4-CE522086EDD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:commerce:2105:*:*:*:*:*:*:*","matchCriteriaId":"4BF52269-A749-4A58-A291-ACD4C41C6FAF"}]}]}],"references":[{"url":"https://launchpad.support.sap.com/#/notes/3114134","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021","source":"cna@sap.com","tags":["Vendor Advisory"]},{"url":"https://launchpad.support.sap.com/#/notes/3114134","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}