SAP

SAP NetWeaver

97 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 11.03.2025 01:15:34
  • Zuletzt bearbeitet 11.03.2025 01:15:34

SAP NetWeaver Application Server ABAP allows malicious scripts to be executed in the application, potentially leading to a Cross-Site Scripting (XSS) vulnerability. This has no impact on the availability of the application, but it can have some minor...

  • EPSS 0.11%
  • Veröffentlicht 11.03.2025 01:15:34
  • Zuletzt bearbeitet 11.03.2025 01:15:34

SAP NetWeaver Enterprise Portal OBN does not perform proper authentication check for a particular configuration setting. As result, a non-authenticated user can set it to an undesired value causing low impact on integrity. There is no impact on confi...

  • EPSS 0.06%
  • Veröffentlicht 11.02.2025 01:15:11
  • Zuletzt bearbeitet 18.02.2025 18:15:33

SAP NetWeaver Application Server Java allows an attacker to access an endpoint that can disclose information about deployed server components, including their XML definitions. This information should ideally be restricted to customer administrators, ...

  • EPSS 0.18%
  • Veröffentlicht 11.02.2025 01:15:10
  • Zuletzt bearbeitet 23.10.2025 18:37:18

SAP NetWeaver Server ABAP allows an unauthenticated attacker to exploit a vulnerability that causes the server to respond differently based on the existence of a specified user, potentially revealing sensitive information. This issue does not enable ...

  • EPSS 0.1%
  • Veröffentlicht 11.02.2025 01:15:10
  • Zuletzt bearbeitet 11.02.2025 01:15:10

Due to missing authorization check, an authenticated attacker could call a remote-enabled function module which allows them to access data that they would otherwise not have access to. The attacker cannot modify data or impact the availability of the...

  • EPSS 0.11%
  • Veröffentlicht 11.02.2025 01:15:10
  • Zuletzt bearbeitet 11.02.2025 01:15:10

Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an authenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability

  • EPSS 0.21%
  • Veröffentlicht 11.02.2025 01:15:10
  • Zuletzt bearbeitet 18.02.2025 18:15:33

Due to missing authorization check in an RFC enabled function module in transaction SDCCN, an unauthenticated attacker could generate technical meta-data. This leads to a low impact on integrity. There is no impact on confidentiality or availability.

  • EPSS 0.16%
  • Veröffentlicht 14.01.2025 01:15:17
  • Zuletzt bearbeitet 14.01.2025 01:15:17

SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to obtain illegitimate access to the system by exploiting improper authentication checks, resulting in privilege escalation. On successful exploitation, this...

  • EPSS 0.11%
  • Veröffentlicht 14.01.2025 01:15:17
  • Zuletzt bearbeitet 14.01.2025 01:15:17

An obsolete functionality in SAP NetWeaver Application Server ABAP did not perform necessary authorization checks. Because of this, an authenticated attacker could obtain information that would otherwise be restricted. It has no impact on integrity o...

  • EPSS 0.02%
  • Veröffentlicht 14.01.2025 01:15:16
  • Zuletzt bearbeitet 14.01.2025 01:15:16

Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating S...