Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
businessobjects_business_intelligence_platform Vendor: sap

About This Product

businessobjects_business_intelligence_platform is a software product offered by sap. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 73 known vulnerabilities affecting sap businessobjects_business_intelligence_platform. This includes 6 critical-severity issues and 21 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2026, indicating a sustained research interest and ongoing security attention. 44 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-2397 2018-03-14 2024-11-21 5.4 3.5 Unknown
CVE-2018-2471 2018-10-09 2024-11-21 7.5 5.0 Likely
CVE-2019-0352 2019-09-10 2024-11-21 7.5 5.0 Likely
CVE-2019-0374 2019-10-08 2024-11-21 5.4 3.5 Unknown
CVE-2019-0375 2019-10-08 2024-11-21 5.4 3.5 Unknown
CVE-2019-0376 2019-10-08 2024-11-21 5.4 3.5 Unknown
CVE-2019-0377 2019-10-08 2024-11-21 5.4 3.5 Unknown
CVE-2019-0378 2019-10-08 2024-11-21 5.4 3.5 Unknown
CVE-2019-0382 2019-11-13 2024-11-21 5.4 3.5 Unknown
CVE-2019-0396 2019-11-13 2024-11-21 7.1 5.5 Likely
CVE-2019-0395 2019-12-11 2024-11-21 5.4 3.5 Unknown
CVE-2019-0398 2019-12-11 2024-11-21 8.8 6.8 Likely
CVE-2020-6189 2020-02-12 2024-11-21 5.3 5.0 Likely
CVE-2020-6216 2020-04-14 2024-11-21 6.1 4.3 Likely
CVE-2020-6218 2020-04-14 2024-11-21 5.0 4.0 Likely
CVE-2020-6219 2020-04-14 2024-11-21 8.8 6.5 Likely
CVE-2020-6221 2020-04-14 2024-11-21 5.4 3.5 Unknown
CVE-2020-6222 2020-04-14 2024-11-21 5.4 3.5 Unknown
CVE-2020-6223 2020-04-14 2024-11-21 6.1 5.8 Likely
CVE-2020-6226 2020-04-14 2024-11-21 5.4 3.5 Unknown
CVE-2020-6227 2020-04-14 2024-11-21 7.5 5.0 Likely
CVE-2020-6231 2020-04-14 2024-11-21 5.4 3.5 Unknown
CVE-2020-6237 2020-04-14 2024-11-21 7.5 5.0 Likely
CVE-2020-6195 2020-04-14 2024-11-21 9.8 5.0 Likely
CVE-2020-6211 2020-04-14 2024-11-21 6.1 5.8 Likely
CVE-2020-6242 2020-05-12 2024-11-21 9.8 7.5 Likely
CVE-2020-6245 2020-05-12 2024-11-21 6.7 4.6 Unknown
CVE-2020-6247 2020-05-12 2024-11-21 7.5 5.0 Likely
CVE-2020-6251 2020-05-12 2024-11-21 6.5 5.0 Likely
CVE-2020-6257 2020-05-12 2024-11-21 5.4 3.5 Unknown
CVE-2020-6269 2020-06-10 2024-11-21 6.5 4.0 Likely
CVE-2020-6276 2020-07-14 2024-11-21 6.1 4.3 Likely
CVE-2020-6278 2020-07-14 2024-11-21 5.4 3.5 Unknown
CVE-2020-6281 2020-07-14 2024-11-21 6.1 4.3 Likely
CVE-2020-6294 2020-08-12 2024-11-21 9.1 6.4 Likely
CVE-2020-6300 2020-08-12 2024-11-21 4.8 3.5 Unknown
CVE-2020-6288 2020-09-09 2024-11-21 5.3 5.0 Likely
CVE-2020-6312 2020-09-09 2024-11-21 5.4 3.5 Unknown
CVE-2020-6308 2020-10-20 2024-11-21 5.3 5.0 Likely
CVE-2020-26831 2020-12-09 2024-11-21 9.6 5.5 Likely
CVE-2021-33679 2021-09-14 2024-11-21 5.4 3.5 Unknown
CVE-2021-40500 2021-10-12 2024-11-21 7.5 5.0 Likely
CVE-2021-42061 2021-12-14 2024-11-21 5.4 3.5 Unknown
CVE-2022-22541 2022-04-12 2024-11-21 6.5 4.0 Likely
CVE-2022-27667 2022-04-12 2024-11-21 7.5 4.3 Likely
CVE-2022-27671 2022-04-12 2024-11-21 6.5 4.3 Likely
CVE-2022-28213 2022-04-12 2024-11-21 8.1 5.5 Likely
CVE-2022-28216 2022-04-12 2024-11-21 6.1 4.3 Likely
CVE-2022-29619 2022-07-12 2024-11-21 6.5 5.5 Likely
CVE-2022-35169 2022-07-12 2024-11-21 6.0 6.5 Likely
CVE-2022-35228 2022-07-12 2024-11-21 8.8 6.8 Likely
CVE-2022-39014 2022-09-13 2024-11-21 5.3 - -
CVE-2023-0018 2023-01-10 2024-11-21 10.0 - -
CVE-2023-0022 2023-01-10 2024-11-21 9.9 - -
CVE-2023-0020 2023-02-14 2024-11-21 8.5 - -
CVE-2023-24530 2023-02-14 2024-11-21 8.4 - -
CVE-2023-27271 2023-03-14 2024-11-21 6.5 - -
CVE-2023-42472 2023-09-12 2024-11-21 8.7 - -
CVE-2024-28165 2024-05-14 2025-10-23 8.1 - -
CVE-2024-33004 2024-05-14 2025-10-23 4.3 - -
CVE-2024-34684 2024-06-11 2024-11-21 3.7 - -
CVE-2024-45281 2024-09-10 2025-10-28 5.8 - -
CVE-2024-32732 2024-12-10 2025-10-28 5.3 - -
CVE-2025-0060 2025-01-14 2025-10-24 6.5 - -
CVE-2025-0061 2025-01-14 2025-10-24 8.7 - -
CVE-2025-0064 2025-02-11 2025-10-23 8.7 - -
CVE-2025-25245 2025-03-11 2025-10-24 5.4 - -
CVE-2025-31332 2025-04-08 2025-10-24 6.6 - -
CVE-2025-42988 2025-06-10 2025-10-23 3.7 - -
CVE-2026-0485 2026-02-10 2026-02-17 7.5 - -
CVE-2026-0490 2026-02-10 2026-02-17 7.5 - -
CVE-2026-0508 2026-02-10 2026-02-17 7.3 - -
CVE-2026-24324 2026-02-10 2026-02-17 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for sap businessobjects_business_intelligence_platform by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.