Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap netweaver 7.0 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-0257
Customizing functionality of SAP NetWeaver AS ABAP Platform (fixed in versions from 7.0 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.53, from 7.74 to 7.75) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privil...
Sap Netweaver As Abap
Sap Netweaver Application Server Abap 7.31
Sap Netweaver Application Server Abap
Sap Netweaver Application Server Abap 7.30
Sap Netweaver Application Server Abap 7.40
7.2
CVSSv3
CVE-2019-0355
SAP NetWeaver Application Server Java Web Container, ENGINEAPI (prior to 7.10, 7.20, 7.30, 7.31, 7.40, 7.50) and SAP-JEECOR (prior to 6.40, 7.0, 7.01), allows an malicious user to inject code that can be executed by the application. An attacker could thereby control the behaviour...
Sap Netweaver Application Server Java 7.30
Sap Netweaver Application Server Java 7.31
Sap Netweaver Application Server Java 7.40
Sap Netweaver Application Server Java 7.50
Sap Netweaver Application Server Java 7.10
Sap Netweaver Application Server Java 7.20
NA
CVE-2008-1846
The default configuration of SAP NetWeaver prior to 7.0 SP15 does not enable the "Always Use Secure HTML Editor" (aka Editor Security or Secure Editing) parameter, which allows remote malicious users to conduct cross-site scripting (XSS) attacks by entering feedback for...
Sap Netweaver
4.3
CVSSv3
CVE-2018-2434
A content spoofing vulnerability in the following components allows to render html pages containing arbitrary plain text content, which might fool an end user: UI add-on for SAP NetWeaver (UI_Infra, 1.0), SAP UI Implementation for Decoupled Innovations (UI_700, 2.0): SAP NetWeave...
Sap Ui Infra 1.0
Sap User Interface Technology 7.5
Sap User Interface Technology 7.51
Sap User Interface Technology 7.52
Sap Netweaver 7.0
Sap User Interface Technology 7.4
7.5
CVSSv3
CVE-2017-14581
The Host Control web service in SAP NetWeaver AS JAVA 7.0 up to and including 7.5 allows remote malicious users to cause a denial of service (service crash) via a crafted request, aka SAP Security Note 2389181.
Sap Netweaver Application Server Java
NA
CVE-2007-3615
Internet Communication Manager (aka ICMAN.exe or ICM) in SAP NetWeaver Application Server 6.x and 7.x, possibly only on Windows, allows remote malicious users to cause a denial of service (process crash) via a URI of a certain length that contains a sap-isc-key parameter, related...
Sap Internet Communication Manager
Sap Sap Web Application Server 6.10
Sap Sap Web Application Server 6.20
Sap Sap Web Application Server 6.40
Sap Sap Web Application Server 7.0
Sap Sap Web Application Server 7.0.10
NA
CVE-2011-1516
The kSBXProfileNoNetwork and kSBXProfileNoInternet sandbox profiles in Apple Mac OS X 10.5.x up to and including 10.7.x do not propagate restrictions to all created processes, which allows remote malicious users to access network resources via a crafted application, as demonstrat...
Apple Mac Os X 10.5.1
Apple Mac Os X 10.5.2
Apple Mac Os X 10.6.0
Apple Mac Os X 10.6.1
Apple Mac Os X 10.6.8
Apple Mac Os X 10.7.0
Apple Mac Os X 10.5.0
Apple Mac Os X 10.5.7
Apple Mac Os X 10.5.8
Apple Mac Os X 10.6.6
Apple Mac Os X 10.6.7
Apple Mac Os X 10.5.3
Apple Mac Os X 10.5.4
Apple Mac Os X 10.6.2
Apple Mac Os X 10.6.3
Apple Mac Os X 10.7.1
Apple Mac Os X 10.7.2
Apple Mac Os X 10.5.5
Apple Mac Os X 10.5.6
Apple Mac Os X 10.6.4
Apple Mac Os X 10.6.5
1 EDB exploit
NA
CVE-2012-25143
Core Security Technologies Advisory - SAP Netweaver is a technology platform for building and integrating SAP business applications. Multiple vulnerabilities have been found in SAP Netweaver that could allow an unauthenticated, remote attacker to execute arbitrary code and lead t...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4