Sap Se Sap Netweaver vulnerabilities
40 known vulnerabilities affecting sap_se/sap_netweaver.
Total CVEs
40
CISA KEV
3
actively exploited
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL6HIGH9MEDIUM24LOW1
Vulnerabilities
Page 2 of 2
CVE-2023-0021MEDIUMCVSS 6.1v700v701+4 more2023-03-14
CVE-2023-0021 [MEDIUM] CWE-79 CVE-2023-0021: Due to insufficient encoding of user input, SAP NetWeaver - versions 700, 701, 702, 731, 740, 750, a
Due to insufficient encoding of user input, SAP NetWeaver - versions 700, 701, 702, 731, 740, 750, allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password, which could lead to reflected Cross-Site scripting. These endpoints are normally exposed over the network and successful exploitation can partially
cvelistv5nvd
CVE-2022-28217MEDIUMCVSS 6.5v7.20v7.30+3 more2022-06-13
CVE-2022-28217 [MEDIUM] CWE-918 CVE-2022-28217: Some part of SAP NetWeaver (EP Web Page Composer) does not sufficiently validate an XML document acc
Some part of SAP NetWeaver (EP Web Page Composer) does not sufficiently validate an XML document accepted from an untrusted source, which allows an adversary to exploit unprotected XML parking at endpoints, and a possibility to conduct SSRF attacks that could compromise system�s Availability by causing system to crash.
cvelistv5nvd
CVE-2022-28773HIGHCVSS 7.5vKRNL64NUC 7.22v7.22EXT+8 more2022-04-12
CVE-2022-28773 [HIGH] CWE-674 CVE-2022-28773: Due to an uncontrolled recursion in SAP Web Dispatcher and SAP Internet Communication Manager, the a
Due to an uncontrolled recursion in SAP Web Dispatcher and SAP Internet Communication Manager, the application may crash, leading to denial of service, but can be restarted automatically.
cvelistv5nvd
CVE-2022-28772HIGHCVSS 7.5vKRNL64NUC 7.22v7.22EXT+8 more2022-04-12
CVE-2022-28772 [HIGH] CWE-121 CVE-2022-28772: By overlong input values an attacker may force overwrite of the internal program stack in SAP Web Di
By overlong input values an attacker may force overwrite of the internal program stack in SAP Web Dispatcher - versions 7.53, 7.77, 7.81, 7.85, 7.86, or Internet Communication Manager - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, which makes these programs unavailable, le
cvelistv5nvd
CVE-2022-26103MEDIUMCVSS 5.3fixed in 7.502022-03-10
CVE-2022-26103 [MEDIUM] CWE-862 CVE-2022-26103: Under certain conditions, SAP NetWeaver (Real Time Messaging Framework) - version 7.50, allows an at
Under certain conditions, SAP NetWeaver (Real Time Messaging Framework) - version 7.50, allows an attacker to access information which could lead to information gathering for further exploits and attacks.
cvelistv5nvd
CVE-2022-22534MEDIUMCVSS 6.1v700v701+10 more2022-02-09
CVE-2022-22534 [MEDIUM] CWE-79 CVE-2022-22534: Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inje
Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.
cvelistv5nvd
CVE-2021-38183MEDIUMCVSS 6.1fixed in 700fixed in 701+2 more2021-10-12
CVE-2021-38183 [MEDIUM] CWE-79 CVE-2021-38183: SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, al
SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and executed by the web browser, resulting in Cross-Site Scripting vulnerability.
cvelistv5nvd
CVE-2021-38163HIGHCVSS 8.8KEVv7.30v7.31+2 more2021-09-14
CVE-2021-38163 [HIGH] CWE-22 CVE-2021-38163: SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an at
SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to re
cvelistv5nvd
CVE-2021-33707MEDIUMCVSS 6.1fixed in 7.30fixed in 7.31+2 more2021-08-10
CVE-2021-33707 [MEDIUM] CWE-601 CVE-2021-33707: SAP NetWeaver Knowledge Management allows remote attackers to redirect users to arbitrary websites a
SAP NetWeaver Knowledge Management allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via a URL stored in a component. This could enable the attacker to compromise the user's confidentiality and integrity.
cvelistv5nvd
CVE-2020-6370MEDIUMCVSS 4.8fixed in 7.11fixed in 7.30+3 more2020-10-20
CVE-2020-6370 [MEDIUM] CWE-79 CVE-2020-6370: SAP NetWeaver Design Time Repository (DTR), versions - 7.11, 7.30, 7.31, 7.40, 7.50, does not suffic
SAP NetWeaver Design Time Repository (DTR), versions - 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
cvelistv5nvd
CVE-2020-6366MEDIUMCVSS 6.5fixed in 7.20fixed in 7.30+3 more2020-10-20
CVE-2020-6366 [MEDIUM] CWE-20 CVE-2020-6366: SAP NetWeaver (Compare Systems) versions - 7.20, 7.30, 7.40, 7.50, does not sufficiently validate up
SAP NetWeaver (Compare Systems) versions - 7.20, 7.30, 7.40, 7.50, does not sufficiently validate uploaded XML documents. An attacker with administrative privileges can retrieve arbitrary files including files on OS level from the server and/or can execute a denial-of-service.
cvelistv5nvd
CVE-2020-6326MEDIUMCVSS 5.4fixed in 7.30fixed in 7.31+2 more2020-09-09
CVE-2020-6326 [MEDIUM] CWE-79 CVE-2020-6326: SAP NetWeaver (Knowledge Management), version-7.30,7.31,7.40,7.50, allows an authenticated attacker
SAP NetWeaver (Knowledge Management), version-7.30,7.31,7.40,7.50, allows an authenticated attacker to create malicious links in the UI, when clicked by victim, will execute arbitrary java scripts thus extracting or modifying information otherwise restricted leading to Stored Cross Site Scripting.
cvelistv5nvd
CVE-2020-6284CRITICALCVSS 9.0fixed in 7.30fixed in 7.31+2 more2020-08-12
CVE-2020-6284 [CRITICAL] CWE-79 CVE-2020-6284: SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows the automatic execut
SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows the automatic execution of script content in a stored file due to inadequate filtering with the accessing user's privileges. If the accessing user has administrative privileges, then the execution of the script content could result in complete compromise of system confide
cvelistv5nvd
CVE-2020-6293MEDIUMCVSS 6.5fixed in 7.30fixed in 7.31+2 more2020-08-12
CVE-2020-6293 [MEDIUM] CWE-434 CVE-2020-6293: SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated a
SAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to upload a malicious file and also to access, modify or make unavailable existing files but the impact is limited to the files themselves and is restricted by other policies such as access control lists and other upload file size restrictions,
cvelistv5nvd
CVE-2020-6225HIGHCVSS 8.8fixed in 7.00fixed in 7.01+5 more2020-04-14
CVE-2020-6225 [HIGH] CWE-22 CVE-2020-6225: SAP NetWeaver (Knowledge Management), versions (KMC-CM - 7.00, 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 an
SAP NetWeaver (Knowledge Management), versions (KMC-CM - 7.00, 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 and KMC-WPC 7.30, 7.31, 7.40, 7.50), does not sufficiently validate path information provided by users, thus characters representing traverse to parent directory are passed through to the file APIs, allowing the attacker to overwrite, delete, or corrupt arbi
cvelistv5nvd
CVE-2020-6185MEDIUMCVSS 5.4v= 7.402020-02-12
CVE-2020-6185 [MEDIUM] CWE-79 CVE-2020-6185: Under certain conditions ABAP Online Community in SAP NetWeaver (SAP_BASIS version 7.40) and SAP S/4
Under certain conditions ABAP Online Community in SAP NetWeaver (SAP_BASIS version 7.40) and SAP S/4HANA (SAP_BASIS versions 7.50, 7.51, 7.52, 7.53, 7.54), allows an authenticated attacker to store a malicious payload which results in Stored Cross Site Scripting vulnerability.
cvelistv5nvd
CVE-2020-6181MEDIUMCVSS 5.8v= 7.02v= 7.30+2 more2020-02-12
CVE-2020-6181 [MEDIUM] CVE-2020-6181: Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 7
Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
cvelistv5nvd
CVE-2020-6193MEDIUMCVSS 6.1v= 7.30v= 7.31+2 more2020-02-12
CVE-2020-6193 [MEDIUM] CWE-79 CVE-2020-6193: SAP NetWeaver (Knowledge Management ICE Service), versions 7.30, 7.31, 7.40, 7.50, allows an unauthe
SAP NetWeaver (Knowledge Management ICE Service), versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to execute malicious scripts leading to Reflected Cross-Site Scripting (XSS) vulnerability.
cvelistv5nvd
CVE-2020-6187MEDIUMCVSS 4.9v= 7.10v= 7.11+5 more2020-02-12
CVE-2020-6187 [MEDIUM] CWE-611 CVE-2020-6187: SAP NetWeaver (Guided Procedures), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not suffi
SAP NetWeaver (Guided Procedures), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document input from a compromised admin, leading to Denial of Service.
cvelistv5nvd
CVE-2018-2363HIGHCVSS 8.8v7.00v7.02+7 more2018-01-09
CVE-2018-2363 [HIGH] CWE-94 CVE-2018-2363: SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52,
SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code that allows you to execute arbitrary program code of the user's choice. A malicious user can therefore control the behaviour of the system or can potentially escalate privileges by executing malicious code without legitimate credentials.
cvelistv5nvd
← Previous2 / 2