Show filters
189 Total Results
Displaying 1-10 of 189
Sort by:
Attacker Value
Unknown
CVE-2024-47594
Disclosure Date: October 08, 2024 (last updated November 15, 2024)
SAP NetWeaver Enterprise Portal (KMC) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting vulnerability in KMC servlet. An attacker could craft a script and trick the user into clicking it. When a victim who is registered on the portal clicks on such link, confidentiality and integrity of their web browser session could be compromised.
0
Attacker Value
Unknown
CVE-2024-33005
Disclosure Date: August 13, 2024 (last updated September 13, 2024)
Due to the missing authorization checks in the
local systems, the admin users of SAP Web Dispatcher, SAP NetWeaver Application
Server (ABAP and Java), and SAP Content Server can impersonate other users and
may perform some unintended actions. This could lead to a low impact on
confidentiality and a high impact on the integrity and availability of the
applications.
0
Attacker Value
Unknown
CVE-2024-34685
Disclosure Date: July 09, 2024 (last updated August 30, 2024)
Due to weak encoding of user-controlled input in
SAP NetWeaver Knowledge Management XMLEditor which allows malicious scripts can
be executed in the application, potentially leading to a Cross-Site Scripting
(XSS) vulnerability. This has no impact on the availability of the application
but it has a low impact on its confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2024-34688
Disclosure Date: June 11, 2024 (last updated August 10, 2024)
Due to unrestricted access to the Meta Model
Repository services in SAP NetWeaver AS Java, attackers can perform DoS attacks
on the application, which may prevent legitimate users from accessing it. This
can result in no impact on confidentiality and integrity but a high impact on
the availability of the application.
0
Attacker Value
Unknown
CVE-2024-28164
Disclosure Date: June 11, 2024 (last updated August 07, 2024)
SAP NetWeaver AS Java (CAF - Guided Procedures)
allows an unauthenticated user to access non-sensitive information about the
server which would otherwise be restricted causing low impact on
confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-27898
Disclosure Date: April 09, 2024 (last updated February 07, 2025)
SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.
0
Attacker Value
Unknown
CVE-2024-28163
Disclosure Date: March 12, 2024 (last updated February 08, 2025)
Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration (PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.
0
Attacker Value
Unknown
CVE-2024-25645
Disclosure Date: March 12, 2024 (last updated February 08, 2025)
Under certain condition SAP NetWeaver (Enterprise Portal) - version 7.50 allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application.
0
Attacker Value
Unknown
CVE-2024-22127
Disclosure Date: March 12, 2024 (last updated February 08, 2025)
SAP NetWeaver Administrator AS Java (Administrator Log Viewer plug-in) - version 7.50, allows an attacker with high privileges to upload potentially dangerous files which leads to command injection vulnerability. This would enable the attacker to run commands which can cause high impact on confidentiality, integrity and availability of the application.
0
Attacker Value
Unknown
CVE-2024-24743
Disclosure Date: February 13, 2024 (last updated October 17, 2024)
SAP NetWeaver AS Java (CAF - Guided Procedures) - version 7.50, allows an unauthenticated attacker to submit a malicious request with a crafted XML file over the network, which when parsed will enable him to access sensitive files and data but not modify them. There are expansion limits in place so that availability is not affected.
0