Vulnerabilities (CVE)

Filtered by vendor Sap Subscribe
Filtered by product Netweaver Application Server Abap
Total 76 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-27603 1 Sap 1 Netweaver Application Server Abap 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
An RFC enabled function module SPI_WAIT_MILLIS in SAP NetWeaver AS ABAP, versions - 731, 740, 750, allows to keep a work process busy for any length of time. An attacker could call this function module multiple times to block all work processes thereby causing Denial of Service and affecting the Availability of the SAP system.
CVE-2021-21490 1 Sap 1 Netweaver Application Server Abap 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SAP NetWeaver AS for ABAP (Web Survey), versions - 700, 702, 710, 711, 730, 731, 750, 750, 752, 75A, 75F, does not sufficiently encode input and output parameters which results in reflected cross site scripting vulnerability, through which a malicious user can access data relating to the current session and use it to impersonate a user and access all information with the same rights as the target user.
CVE-2021-21473 1 Sap 1 Netweaver Application Server Abap 2024-11-21 6.5 MEDIUM 6.3 MEDIUM
SAP NetWeaver AS ABAP and ABAP Platform, versions - 700, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, contains function module SRM_RFC_SUBMIT_REPORT which fails to validate authorization of an authenticated user thus allowing an unauthorized user to execute reports in SAP NetWeaver ABAP Platform.
CVE-2021-21446 1 Sap 1 Netweaver Application Server Abap 2024-11-21 5.0 MEDIUM 7.5 HIGH
SAP NetWeaver AS ABAP, versions 740, 750, 751, 752, 753, 754, 755, allows an unauthenticated attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, this has a high impact on the availability of the service.
CVE-2020-6371 1 Sap 1 Netweaver Application Server Abap 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
User enumeration vulnerability can be exploited to get a list of user accounts and personal user information can be exposed in SAP NetWeaver Application Server ABAP (POWL test application) versions - 710, 711, 730, 731, 740, 750, leading to Information Disclosure.
CVE-2020-6310 1 Sap 2 Abap Platform, Netweaver Application Server Abap 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.
CVE-2020-6299 1 Sap 2 Abap Platform, Netweaver Application Server Abap 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.
CVE-2020-6296 1 Sap 2 Abap Platform, Netweaver Application Server Abap 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.
CVE-2020-6280 1 Sap 2 Abap Platform, Netweaver Application Server Abap 2024-11-21 4.0 MEDIUM 2.7 LOW
SAP NetWeaver (ABAP Server) and ABAP Platform, versions 731, 740, 750, allows an attacker with admin privileges to access certain files which should otherwise be restricted, leading to Information Disclosure.
CVE-2020-6275 1 Sap 1 Netweaver Application Server Abap 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
CVE-2020-6270 1 Sap 1 Netweaver Application Server Abap 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
SAP NetWeaver AS ABAP (Banking Services), versions - 710, 711, 740, 750, 751, 752, 75A, 75B, 75C, 75D, 75E, does not perform necessary authorization checks for an authenticated user due to Missing Authorization Check, allowing wrong and unexpected change of individual conditions by a malicious user leading to wrong prices.
CVE-2020-6240 1 Sap 1 Netweaver Application Server Abap 2024-11-21 5.0 MEDIUM 7.5 HIGH
SAP NetWeaver AS ABAP (Web Dynpro ABAP), versions (SAP_UI 750, 752, 753, 754 and SAP_BASIS 700, 710, 730, 731, 804) allows an unauthenticated attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service leading to Denial of Service
CVE-2020-26835 1 Sap 1 Netweaver Application Server Abap 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability.
CVE-2020-26832 1 Sap 2 Netweaver Application Server Abap, S\/4 Hana 2024-11-21 7.5 HIGH 7.6 HIGH
SAP AS ABAP (SAP Landscape Transformation), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA (SAP Landscape Transformation), versions - 101, 102, 103, 104, 105, allows a high privileged user to execute a RFC function module to which access should be restricted, however due to missing authorization an attacker can get access to some sensitive internal information of vulnerable SAP system or to make vulnerable SAP systems completely unavailable.
CVE-2020-26819 1 Sap 1 Netweaver Application Server Abap 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP NetWeaver AS ABAP (Web Dynpro), versions - 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, that allows them to read and delete database logfiles because of Improper Access Control.
CVE-2020-26818 1 Sap 1 Netweaver Application Server Abap 2024-11-21 6.5 MEDIUM 8.8 HIGH
SAP NetWeaver AS ABAP (Web Dynpro), versions - 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, which reveals sensitive system information that would otherwise be restricted to highly privileged users because of missing authorization, resulting in Information Disclosure.
CVE-2019-0321 1 Sap 2 Netweaver Application Server Abap, Netweaver As Abap 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
ABAP Server and ABAP Platform (SAP Basis), versions, 7.31, 7.4, 7.5, do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
CVE-2019-0257 1 Sap 2 Netweaver Application Server Abap, Netweaver As Abap 2024-11-21 6.5 MEDIUM 8.8 HIGH
Customizing functionality of SAP NetWeaver AS ABAP Platform (fixed in versions from 7.0 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.53, from 7.74 to 7.75) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
CVE-2024-24740 1 Sap 1 Netweaver Application Server Abap 2024-10-16 N/A 5.3 MEDIUM
SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions, allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application.
CVE-2023-40309 1 Sap 9 Commoncryptolib, Content Server, Extended Application Services And Runtime and 6 more 2024-09-28 N/A 9.8 CRITICAL
SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.