📦 Business One

by Sap

🔍 What is Business One?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2023-31403

CRITICAL CVSS 9.6 Nov 14, 2023

This vulnerability in SAP Business One version 10.0 allows unauthenticated attackers to read, write, and execute files on SMB shared folders used during installation. Any organization running the vuln...

CVE-2023-39437

HIGH CVSS 7.6 Aug 8, 2023

CVE-2023-39437 is a cross-site scripting (XSS) vulnerability in SAP Business One version 10.0 that allows attackers to inject malicious scripts into web pages. When exploited, this can compromise user...

CVE-2023-33993

HIGH CVSS 7.1 Aug 8, 2023

This SQL injection vulnerability in SAP Business One's B1i module allows authenticated users with deep knowledge to craft malicious queries that can read or modify SQL data. Successful exploitation ca...

CVE-2022-31593

HIGH CVSS 8.8 Jul 12, 2022

CVE-2022-31593 is a code injection vulnerability in SAP Business One client version 10.0 that allows authenticated attackers with low privileges to execute arbitrary code within the application. This ...

CVE-2022-32249

HIGH CVSS 7.5 Jul 12, 2022

This vulnerability in SAP Business One integration with SAP HANA allows attackers to access HANA cockpit's data volume containing sensitive information like high-privileged credentials. It affects SAP...

CVE-2021-33698

HIGH CVSS 8.8 Sep 15, 2021

This vulnerability allows authenticated users with business authorization in SAP Business One to upload arbitrary files, including malicious scripts, due to insufficient file format validation. Attack...

CVE-2021-27616

HIGH CVSS 7.8 May 11, 2021

CVE-2021-27616 is an information disclosure vulnerability in SAP Business One Hana Chef Cookbook that allows attackers to access restricted information through insecure temporary backup paths. This af...

CVE-2026-24319

MEDIUM CVSS 5.8 Feb 10, 2026

SAP Business One writes sensitive information to memory dump files without obfuscation, allowing attackers who access these files to potentially perform unauthorized operations and modify company data...