Show filters
44 Total Results
Displaying 31-40 of 44
Sort by:
Attacker Value
Unknown
CVE-2021-38181
Disclosure Date: October 12, 2021 (last updated November 28, 2024)
SAP NetWeaver AS ABAP and ABAP Platform - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
0
Attacker Value
Unknown
CVE-2021-38178
Disclosure Date: October 12, 2021 (last updated February 23, 2025)
The software logistics system of SAP NetWeaver AS ABAP and ABAP Platform versions - 700, 701, 702, 710, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, enables a malicious user to transfer ABAP code artifacts or content, by-passing the established quality gates. By this vulnerability malicious code can reach quality and production, and can compromise the confidentiality, integrity, and availability of the system and its data.
0
Attacker Value
Unknown
CVE-2021-33678
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
A function module of SAP NetWeaver AS ABAP (Reconciliation Framework), versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 75A, 75B, 75B, 75C, 75D, 75E, 75F, allows a high privileged attacker to inject code that can be executed by the application. An attacker could thereby delete some critical information and could make the SAP system completely unavailable.
0
Attacker Value
Unknown
CVE-2021-27610
Disclosure Date: June 16, 2021 (last updated February 22, 2025)
SAP NetWeaver ABAP Server and ABAP Platform, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 804, does not create information about internal and external RFC user in consistent and distinguished format, which could lead to improper authentication and may be exploited by malicious users to obtain illegitimate access to the system.
0
Attacker Value
Unknown
CVE-2021-27611
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
SAP NetWeaver AS ABAP, versions - 700, 701, 702, 730, 731, allow a high privileged attacker to inject malicious code by executing an ABAP report when the attacker has access to the local SAP system. The attacker could then get access to data, overwrite them, or execute a denial of service.
0
Attacker Value
Unknown
CVE-2020-6324
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
SAP Netweaver AS ABAP(BSP Test Application sbspext_table), version-700,701,720,730,731,740,750,751,752,753,754,755, allows an unauthenticated attacker to send polluted URL to the victim, when the victim clicks on this URL, the attacker can read, modify the information available in the victim�s browser leading to Reflected Cross Site Scripting.
0
Attacker Value
Unknown
CVE-2020-6296
Disclosure Date: August 12, 2020 (last updated November 28, 2024)
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.
0
Attacker Value
Unknown
CVE-2020-6310
Disclosure Date: August 12, 2020 (last updated November 28, 2024)
Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.
0
Attacker Value
Unknown
CVE-2020-6246
Disclosure Date: June 10, 2020 (last updated February 21, 2025)
SAP NetWeaver AS ABAP Business Server Pages Test Application SBSPEXT_TABLE, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability.
0
Attacker Value
Unknown
CVE-2020-6275
Disclosure Date: June 10, 2020 (last updated February 21, 2025)
SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
0