CVE-2024-28163
- EPSS 0.29%
- Veröffentlicht 12.03.2024 01:15:50
- Zuletzt bearbeitet 07.02.2025 17:24:35
Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration (PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and...
CVE-2023-37488
- EPSS 0.29%
- Veröffentlicht 08.08.2023 01:15:18
- Zuletzt bearbeitet 21.11.2024 08:11:48
In SAP NetWeaver Process Integration - versions SAP_XIESR 7.50, SAP_XITOOL 7.50, SAP_XIAF 7.50, user-controlled inputs, if not sufficiently encoded, could result in Cross-Site Scripting (XSS) attack. On successful exploitation the attacker can cause ...
CVE-2023-35873
- EPSS 0.13%
- Veröffentlicht 11.07.2023 03:15:09
- Zuletzt bearbeitet 21.11.2024 08:08:52
The Runtime Workbench (RWB) of SAP NetWeaver Process Integration - version SAP_XITOOL 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the p...
CVE-2023-35872
- EPSS 0.13%
- Veröffentlicht 11.07.2023 03:15:09
- Zuletzt bearbeitet 21.11.2024 08:08:52
The Message Display Tool (MDT) of SAP NetWeaver Process Integration - version SAP_XIAF 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the ...
CVE-2022-41272
- EPSS 0.59%
- Veröffentlicht 13.12.2022 04:15:24
- Zuletzt bearbeitet 21.11.2024 07:22:57
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access ser...
CVE-2022-41271
- EPSS 0.19%
- Veröffentlicht 13.12.2022 03:15:09
- Zuletzt bearbeitet 21.11.2024 07:22:57
An unauthenticated user can attach to an open interface exposed through JNDI by the Messaging System of SAP NetWeaver Process Integration (PI) - version 7.50. This user can make use of an open naming and directory API to access services that could pe...
CVE-2021-27618
- EPSS 0.21%
- Veröffentlicht 11.05.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 05:58:18
The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not check the file type extension of the file uploaded from local source. An attacker could craft a malicious file and upload it to...
CVE-2021-27617
- EPSS 0.21%
- Veröffentlicht 11.05.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 05:58:18
The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and...
CVE-2021-27604
- EPSS 0.34%
- Veröffentlicht 14.04.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 05:58:16
In order to prevent XML External Entity vulnerability in SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Enterprise Service Repository JAVA Mappings), versions - 7.10, 7.20, 7.30, 7.31, 7.40, 7.50, SAP recommends to refer this note...
CVE-2021-27599
- EPSS 0.23%
- Veröffentlicht 14.04.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 05:58:16
SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Integration Builder Framework), versions - 7.10, 7.30, 7.31, 7.40, 7.50, allows an attacker to access information under certain conditions, which would otherwise be restricted.