Show filters
189 Total Results
Displaying 1-10 of 189
Sort by:
Attacker Value
Unknown

CVE-2024-47594

Disclosure Date: October 08, 2024 (last updated November 15, 2024)
SAP NetWeaver Enterprise Portal (KMC) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability in KMC servlet. An attacker could craft a script and trick the user into clicking it. When a victim who is registered on the portal clicks on such link, confidentiality and integrity of their web browser session could be compromised.
Attacker Value
Unknown

CVE-2024-33005

Disclosure Date: August 13, 2024 (last updated September 13, 2024)
Due to the missing authorization checks in the local systems, the admin users of SAP Web Dispatcher, SAP NetWeaver Application Server (ABAP and Java), and SAP Content Server can impersonate other users and may perform some unintended actions. This could lead to a low impact on confidentiality and a high impact on the integrity and availability of the applications.
Attacker Value
Unknown

CVE-2024-34685

Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Due to weak encoding of user-controlled input in SAP NetWeaver Knowledge Management XMLEditor which allows malicious scripts can be executed in the application, potentially leading to a Cross-Site Scripting (XSS) vulnerability. This has no impact on the availability of the application but it has a low impact on its confidentiality and integrity.
Attacker Value
Unknown

CVE-2024-34688

Disclosure Date: June 11, 2024 (last updated August 10, 2024)
Due to unrestricted access to the Meta Model Repository services in SAP NetWeaver AS Java, attackers can perform DoS attacks on the application, which may prevent legitimate users from accessing it. This can result in no impact on confidentiality and integrity but a high impact on the availability of the application.
Attacker Value
Unknown

CVE-2024-28164

Disclosure Date: June 11, 2024 (last updated August 07, 2024)
SAP NetWeaver AS Java (CAF - Guided Procedures) allows an unauthenticated user to access non-sensitive information about the server which would otherwise be restricted causing low impact on confidentiality of the application.
Attacker Value
Unknown

CVE-2024-27898

Disclosure Date: April 09, 2024 (last updated February 07, 2025)
SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.
Attacker Value
Unknown

CVE-2024-28163

Disclosure Date: March 12, 2024 (last updated February 08, 2025)
Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration (PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.
Attacker Value
Unknown

CVE-2024-25645

Disclosure Date: March 12, 2024 (last updated February 08, 2025)
Under certain condition SAP NetWeaver (Enterprise Portal) - version 7.50 allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application.
Attacker Value
Unknown

CVE-2024-22127

Disclosure Date: March 12, 2024 (last updated February 08, 2025)
SAP NetWeaver Administrator AS Java (Administrator Log Viewer plug-in) - version 7.50, allows an attacker with high privileges to upload potentially dangerous files which leads to command injection vulnerability. This would enable the attacker to run commands which can cause high impact on confidentiality, integrity and availability of the application.
Attacker Value
Unknown

CVE-2024-24743

Disclosure Date: February 13, 2024 (last updated October 17, 2024)
SAP NetWeaver AS Java (CAF - Guided Procedures) - version 7.50, allows an unauthenticated attacker to submit a malicious request with a crafted XML file over the network, which when parsed will enable him to access sensitive files and data but not modify them. There are expansion limits in place so that availability is not affected.