SAP

SAP NetWeaver

75 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 14.01.2025 01:15:16
  • Zuletzt bearbeitet 14.01.2025 01:15:16

Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating S...

  • EPSS 0.06%
  • Veröffentlicht 14.01.2025 01:15:15
  • Zuletzt bearbeitet 14.01.2025 01:15:15

SAP NetWeaver AS JAVA (User Admin Application) is vulnerable to stored cross site scripting vulnerability. An attacker posing as an admin can upload a photo with malicious JS content. When a victim visits the vulnerable component, the attacker can re...

  • EPSS 0.1%
  • Veröffentlicht 14.01.2025 01:15:15
  • Zuletzt bearbeitet 14.01.2025 01:15:15

SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker to gain unauthorized access to system information. By using a specific URL parameter, an unauthenticated attacker could retrieve details such as system configuration. This...

  • EPSS 0.13%
  • Veröffentlicht 10.12.2024 01:15:06
  • Zuletzt bearbeitet 10.12.2024 01:15:06

Due to missing validation of XML input, an unauthenticated attacker could send malicious input to an endpoint which leads to XML Entity Expansion attack. This causes limited impact on availability of the application.

  • EPSS 0.08%
  • Veröffentlicht 10.12.2024 01:15:06
  • Zuletzt bearbeitet 10.12.2024 01:15:06

SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to gain higher access levels than they should have by exploiting improper authorization checks, resulting in privilege escalation. While authorizations for i...

  • EPSS 0.15%
  • Veröffentlicht 10.12.2024 01:15:06
  • Zuletzt bearbeitet 10.12.2024 01:15:06

In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials ca...

  • EPSS 0.14%
  • Veröffentlicht 10.12.2024 01:15:05
  • Zuletzt bearbeitet 10.12.2024 01:15:05

An attacker authenticated as an administrator can use an exposed webservice to create a PDF with an embedded attachment. By specifying the file to be an internal server file and subsequently downloading the generated PDF, the attacker can read any f...

  • EPSS 0.14%
  • Veröffentlicht 10.12.2024 01:15:05
  • Zuletzt bearbeitet 10.12.2024 01:15:05

An attacker authenticated as an administrator can use an exposed webservice to upload or download a custom PDF font file on the system server. Using the upload functionality to copy an internal file into a font file and subsequently using the downlo...

  • EPSS 0.17%
  • Veröffentlicht 10.12.2024 01:15:05
  • Zuletzt bearbeitet 10.12.2024 01:15:05

Adobe Document Service allows an attacker with administrator privileges to send a crafted request from a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the...

  • EPSS 0.02%
  • Veröffentlicht 12.11.2024 01:15:04
  • Zuletzt bearbeitet 12.11.2024 13:55:21

In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administr...