Show filters
189 Total Results
Displaying 141-150 of 189
Sort by:
Attacker Value
Unknown

CVE-2020-6203

Disclosure Date: March 10, 2020 (last updated February 21, 2025)
SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal.
Attacker Value
Unknown

CVE-2020-6187

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
SAP NetWeaver (Guided Procedures), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document input from a compromised admin, leading to Denial of Service.
Attacker Value
Unknown

CVE-2020-6184

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Under certain conditions, ABAP Online Community in SAP NetWeaver (SAP_BASIS version 7.40) and SAP S/4HANA (SAP_BASIS versions 7.50, 7.51, 7.52, 7.53, 7.54), does not sufficiently encode user-controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability.
Attacker Value
Unknown

CVE-2020-6185

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Under certain conditions ABAP Online Community in SAP NetWeaver (SAP_BASIS version 7.40) and SAP S/4HANA (SAP_BASIS versions 7.50, 7.51, 7.52, 7.53, 7.54), allows an authenticated attacker to store a malicious payload which results in Stored Cross Site Scripting vulnerability.
Attacker Value
Unknown

CVE-2020-6181

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
Attacker Value
Unknown

CVE-2020-6193

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
SAP NetWeaver (Knowledge Management ICE Service), versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to execute malicious scripts leading to Reflected Cross-Site Scripting (XSS) vulnerability.
Attacker Value
Unknown

CVE-2020-6190

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Certain vulnerable endpoints in SAP NetWeaver AS Java (Heap Dump Application), versions 7.30, 7.31, 7.40, 7.50, provide valuable information about the system like hostname, server node and installation path that could be misused by an attacker leading to Information Disclosure.
Attacker Value
Unknown

CVE-2020-6304

Disclosure Date: January 14, 2020 (last updated February 21, 2025)
Improper input validation in SAP NetWeaver Internet Communication Manager (update provided in KRNL32NUC & KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT KRNL64NUC & KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49 KERNEL 7.21, 7.49, 7.53) allows an attacker to prevent users from accessing its services through a denial of service.
Attacker Value
Unknown

CVE-2019-0389

Disclosure Date: November 13, 2019 (last updated November 27, 2024)
An administrator of SAP NetWeaver Application Server Java (J2EE-Framework), (corrected in versions 7.1, 7.2, 7.3, 7.31, 7.4, 7.5), may change privileges for all or some functions in Java Server, and enable users to execute functions, they are not allowed to execute otherwise.
Attacker Value
Unknown

CVE-2019-0391

Disclosure Date: November 13, 2019 (last updated November 27, 2024)
Under certain conditions SAP NetWeaver AS Java (corrected in 7.10, 7.20, 7.30, 7.31, 7.40, 7.50) allows an attacker to access information which would otherwise be restricted.