Show filters
189 Total Results
Displaying 151-160 of 189
Sort by:
Attacker Value
Unknown
CVE-2019-0355
Disclosure Date: September 10, 2019 (last updated November 27, 2024)
SAP NetWeaver Application Server Java Web Container, ENGINEAPI (before versions 7.10, 7.20, 7.30, 7.31, 7.40, 7.50) and SAP-JEECOR (before versions 6.40, 7.0, 7.01), allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behaviour of the application.
0
Attacker Value
Unknown
CVE-2019-0356
Disclosure Date: September 10, 2019 (last updated November 27, 2024)
Under certain conditions SAP NetWeaver Process Integration Runtime Workbench – MESSAGING and SAP_XIAF (before versions 7.31, 7.40, 7.50) allows an attacker to access information which would otherwise be restricted.
0
Attacker Value
Unknown
CVE-2019-0337
Disclosure Date: August 14, 2019 (last updated November 27, 2024)
Java Proxy Runtime of SAP NetWeaver Process Integration, versions 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs and allows an attacker to execute malicious scripts in the url thereby resulting in Reflected Cross-Site Scripting (XSS) vulnerability
0
Attacker Value
Unknown
CVE-2019-0345
Disclosure Date: August 14, 2019 (last updated November 27, 2024)
A remote unauthenticated attacker can abuse a web service in SAP NetWeaver Application Server for Java (Administrator System Overview), versions 7.30, 7.31, 7.40, 7.50, by sending a specially crafted XML file and trick the application server into leaking authentication credentials for its own SAP Management console, resulting in Server-Side Request Forgery.
0
Attacker Value
Unknown
CVE-2019-0351
Disclosure Date: August 14, 2019 (last updated November 27, 2024)
A remote code execution vulnerability exists in the SAP NetWeaver UDDI Server (Services Registry), versions 7.10, 7.20, 7.30, 7.31, 7.40, 7.50. Because of this, an attacker can exploit Services Registry potentially enabling them to take complete control of the product, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the product to terminate.
0
Attacker Value
Unknown
CVE-2019-0327
Disclosure Date: July 10, 2019 (last updated November 27, 2024)
SAP NetWeaver for Java Application Server - Web Container, (engineapi, versions 7.1, 7.2, 7.3, 7.31, 7.4 and 7.5), (servercode, versions 7.2, 7.3, 7.31, 7.4, 7.5), allows an attacker to upload files (including script files) without proper file format validation.
0
Attacker Value
Unknown
CVE-2019-0328
Disclosure Date: July 10, 2019 (last updated November 27, 2024)
ABAP Tests Modules (SAP Basis, versions 7.0, 7.1, 7.3, 7.31, 7.4, 7.5) of SAP NetWeaver Process Integration enables an attacker the execution of OS commands with privileged rights. An attacker could thereby impact the integrity and availability of the system.
0
Attacker Value
Unknown
CVE-2019-0321
Disclosure Date: July 10, 2019 (last updated November 27, 2024)
ABAP Server and ABAP Platform (SAP Basis), versions, 7.31, 7.4, 7.5, do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
0
Attacker Value
Unknown
CVE-2019-0318
Disclosure Date: July 10, 2019 (last updated November 27, 2024)
Under certain conditions SAP NetWeaver Application Server for Java (Startup Framework), versions 7.21, 7.22, 7.45, 7.49, and 7.53, allows an attacker to access information which would otherwise be restricted.
0
Attacker Value
Unknown
CVE-2019-0316
Disclosure Date: June 14, 2019 (last updated November 27, 2024)
SAP NetWeaver Process Integration, versions: SAP_XIESR: 7.20, SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate user-controlled inputs, which allows an attacker possessing admin privileges to read and modify data from the victim’s browser, by injecting malicious scripts in certain servlets, which will be executed when the victim is tricked to click on those malicious links, resulting in reflected Cross Site Scripting vulnerability.
0