CVE-2022-22534
- EPSS 1.72%
- Published 09.02.2022 23:15:18
- Last modified 21.11.2024 06:46:58
Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation ca...
CVE-2021-38183
- EPSS 0.6%
- Published 12.10.2021 15:15:08
- Last modified 21.11.2024 06:16:35
SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim an...
- EPSS 88.32%
- Published 14.09.2021 12:15:10
- Last modified 13.03.2025 16:36:14
SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running o...
CVE-2021-21481
- EPSS 0.16%
- Published 09.03.2021 15:15:14
- Last modified 21.11.2024 05:48:27
The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized attacker to access configuration objects, including such that grant admi...
CVE-2020-6285
- EPSS 0.26%
- Published 14.07.2020 13:15:12
- Last modified 21.11.2024 05:35:26
SAP NetWeaver - XML Toolkit for JAVA (ENGINEAPI) (versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50), under certain conditions allows an attacker to access information which would otherwise be restricted, leading to Information Disclosure.
CVE-2020-6203
- EPSS 0.98%
- Published 10.03.2020 21:15:14
- Last modified 21.11.2024 05:35:17
SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory...
CVE-2020-6185
- EPSS 0.27%
- Published 12.02.2020 20:15:14
- Last modified 21.11.2024 05:35:15
Under certain conditions ABAP Online Community in SAP NetWeaver (SAP_BASIS version 7.40) and SAP S/4HANA (SAP_BASIS versions 7.50, 7.51, 7.52, 7.53, 7.54), allows an authenticated attacker to store a malicious payload which results in Stored Cross Si...
CVE-2020-6181
- EPSS 0.31%
- Published 12.02.2020 20:15:13
- Last modified 21.11.2024 05:35:15
Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response h...
CVE-2020-6184
- EPSS 0.54%
- Published 12.02.2020 20:15:13
- Last modified 21.11.2024 05:35:15
Under certain conditions, ABAP Online Community in SAP NetWeaver (SAP_BASIS version 7.40) and SAP S/4HANA (SAP_BASIS versions 7.50, 7.51, 7.52, 7.53, 7.54), does not sufficiently encode user-controlled inputs, resulting in Reflected Cross-Site Script...
CVE-2011-1517
- EPSS 2.37%
- Published 05.02.2020 23:15:11
- Last modified 21.11.2024 01:26:29
SAP NetWeaver 7.0 allows Remote Code Execution and Denial of Service caused by an error in the DiagTraceHex() function. By sending a specially-crafted packet, an attacker could exploit this vulnerability to cause the application to crash.