Show filters
45 Total Results
Displaying 21-30 of 45
Sort by:
Attacker Value
Unknown
CVE-2023-23853
Disclosure Date: February 14, 2023 (last updated October 08, 2023)
An unauthenticated attacker in AP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, can craft a link which when clicked by an unsuspecting user can be used to redirect a user to a malicious site which could read or modify some sensitive information or expose the victim to a phishing attack. Vulnerability has no direct impact on availability.
0
Attacker Value
Unknown
CVE-2023-0014
Disclosure Date: January 10, 2023 (last updated November 08, 2023)
SAP NetWeaver ABAP Server and ABAP Platform - versions SAP_BASIS 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, KERNEL 7.22, 7.53, 7.77, 7.81, 7.85, 7.89, KRNL64UC 7.22, 7.22EXT, 7.53, KRNL64NUC 7.22, 7.22EXT, creates information about system identity in an ambiguous format. This could lead to capture-replay vulnerability and may be exploited by malicious users to obtain illegitimate access to the system.
0
Attacker Value
Unknown
CVE-2023-0013
Disclosure Date: January 10, 2023 (last updated October 08, 2023)
The ABAP Keyword Documentation of SAP NetWeaver Application Server - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, for ABAP and ABAP Platform does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. On successful exploitation an attacker can cause limited impact on confidentiality and integrity of the application.
0
Attacker Value
Unknown
CVE-2022-29611
Disclosure Date: May 11, 2022 (last updated October 07, 2023)
SAP NetWeaver Application Server for ABAP and ABAP Platform do not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
0
Attacker Value
Unknown
CVE-2022-29610
Disclosure Date: May 11, 2022 (last updated October 07, 2023)
SAP NetWeaver Application Server ABAP allows an authenticated attacker to upload malicious files and delete (theme) data, which could result in Stored Cross-Site Scripting (XSS) attack.
0
Attacker Value
Unknown
CVE-2022-22545
Disclosure Date: February 09, 2022 (last updated October 07, 2023)
A high privileged user who has access to transaction SM59 can read connection details stored with the destination for http calls in SAP NetWeaver Application Server ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756.
0
Attacker Value
Unknown
CVE-2022-22540
Disclosure Date: February 09, 2022 (last updated October 07, 2023)
SAP NetWeaver AS ABAP (Workplace Server) - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 787, allows an attacker to execute crafted database queries, that could expose the backend database. Successful attacks could result in disclosure of a table of contents from the system, but no risk of modification possible.
0
Attacker Value
Unknown
CVE-2021-42067
Disclosure Date: January 14, 2022 (last updated October 07, 2023)
In SAP NetWeaver AS for ABAP and ABAP Platform - versions 701, 702, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 786, an attacker authenticated as a regular user can use the S/4 Hana dashboard to reveal systems and services which they would not normally be allowed to see. No information alteration or denial of service is possible.
0
Attacker Value
Unknown
CVE-2021-44235
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
Two methods of a utility class in SAP NetWeaver AS ABAP - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allow an attacker with high privileges and has direct access to SAP System, to inject code when executing with a certain transaction class builder. This could allow execution of arbitrary commands on the operating system, that could highly impact the Confidentiality, Integrity and Availability of the system.
0
Attacker Value
Unknown
CVE-2021-44231
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
0