SAP

Netweaver Knowledge Management

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.61%
  • Published 10.08.2021 15:15:08
  • Last modified 21.11.2024 06:09:24

SAP NetWeaver Knowledge Management allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via a URL stored in a component. This could enable the attacker to compromise the user's confidentiality and integrity.

  • EPSS 0.67%
  • Published 09.03.2021 15:15:15
  • Last modified 21.11.2024 05:48:28

Knowledge Management versions 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 allows a remote attacker with basic privileges to deserialize user-controlled data without verification, leading to insecure deserialization which triggers the attacker’s code, therefor...

  • EPSS 0.31%
  • Published 09.09.2020 13:15:12
  • Last modified 21.11.2024 05:35:30

SAP NetWeaver (Knowledge Management), version-7.30,7.31,7.40,7.50, allows an authenticated attacker to create malicious links in the UI, when clicked by victim, will execute arbitrary java scripts thus extracting or modifying information otherwise re...

  • EPSS 0.75%
  • Published 12.08.2020 14:15:13
  • Last modified 21.11.2024 05:35:26

SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows the automatic execution of script content in a stored file due to inadequate filtering with the accessing user's privileges. If the accessing user has administrative priv...

  • EPSS 0.45%
  • Published 12.08.2020 14:15:13
  • Last modified 21.11.2024 05:35:27

SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to upload a malicious file and also to access, modify or make unavailable existing files but the impact is limited to the files themselves and...

  • EPSS 0.42%
  • Published 12.02.2020 20:15:14
  • Last modified 21.11.2024 05:35:16

SAP NetWeaver (Knowledge Management ICE Service), versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to execute malicious scripts leading to Reflected Cross-Site Scripting (XSS) vulnerability.