Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap netweaver 7.30 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2018-2464
SAP WebDynpro Java, versions 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in a stored Cross-Site Scripting (XSS) vulnerability.
Sap Netweaver 7.31
Sap Netweaver 7.50
Sap Netweaver 7.30
Sap Netweaver 7.40
Sap Netweaver 7.20
6.5
CVSSv2
CVE-2019-0351
A remote code execution vulnerability exists in the SAP NetWeaver UDDI Server (Services Registry), versions 7.10, 7.20, 7.30, 7.31, 7.40, 7.50. Because of this, an attacker can exploit Services Registry potentially enabling them to take complete control of the product, including ...
Sap Netweaver 7.40
Sap Netweaver 7.10
Sap Netweaver 7.20
Sap Netweaver 7.30
Sap Netweaver 7.31
Sap Netweaver 7.50
1 Article
5
CVSSv2
CVE-2013-5751
Directory traversal vulnerability in SAP NetWeaver 7.x allows remote malicious users to read arbitrary files via unspecified vectors.
Sap Netweaver 7.0
Sap Netweaver 7.01
Sap Netweaver 7.02
Sap Netweaver 7.03
Sap Netweaver 7.10
Sap Netweaver 7.30
3.5
CVSSv2
CVE-2020-6285
SAP NetWeaver - XML Toolkit for JAVA (ENGINEAPI) (versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50), under certain conditions allows an malicious user to access information which would otherwise be restricted, leading to Information Disclosure.
Sap Netweaver 7.10
Sap Netweaver 7.11
Sap Netweaver 7.20
Sap Netweaver 7.30
Sap Netweaver 7.31
Sap Netweaver 7.40
Sap Netweaver 7.50
1 Article
6.4
CVSSv2
CVE-2020-6203
SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an malicious user to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed t...
Sap Netweaver 7.10
Sap Netweaver 7.11
Sap Netweaver 7.20
Sap Netweaver 7.30
Sap Netweaver 7.31
Sap Netweaver 7.40
Sap Netweaver 7.50
8.3
CVSSv2
CVE-2021-21481
The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized malicious user to access configuration objects, including such that grant administrative privileges. T...
Sap Netweaver 7.10
Sap Netweaver 7.11
Sap Netweaver 7.20
Sap Netweaver 7.30
Sap Netweaver 7.31
Sap Netweaver 7.40
Sap Netweaver 7.50
1 Article
5
CVSSv2
CVE-2013-6815
The SHSTI_UPLOAD_XML function in the Application Server for ABAP (AS ABAP) in SAP NetWeaver 7.31 and previous versions allows remote malicious users to cause a denial of service via unspecified vectors, related to an XML External Entity (XXE) issue.
Sap Netweaver 7.0
Sap Netweaver 7.02
Sap Netweaver 7.01
Sap Netweaver 4.0
Sap Netweaver
Sap Netweaver 7.30
Sap Netweaver 7.10
Sap Netweaver 7.03
Sap Netweaver 6.4
5
CVSSv2
CVE-2013-6244
The Live Update webdynpro application (webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP) in SAP NetWeaver 7.31 and previous versions allows remote malicious users to read arbitrary files and directories via an XML document containing an external entity declaration in conjunction wi...
Sap Netweaver 7.03
Sap Netweaver 7.02
Sap Netweaver
Sap Netweaver 6.4
Sap Netweaver 4.0
Sap Netweaver 7.01
Sap Netweaver 7.0
Sap Netweaver 7.30
Sap Netweaver 7.10
1 Github repository
4.3
CVSSv2
CVE-2018-2365
SAP NetWeaver Portal, WebDynpro Java, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
Sap Netweaver Portal 7.30
Sap Netweaver Portal 7.40
Sap Netweaver Portal 7.31
Sap Netweaver Portal 7.50
7.5
CVSSv2
CVE-2013-6869
SQL injection vulnerability in the SRTT_GET_COUNT_BEFORE_KEY_RFC function in SAP NetWeaver 7.30 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Sap Netweaver 7.30
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »