Lucene search

K
SapNetweaver Process Integration7.50

19 matches found

CVE
CVE
added 2019/06/14 7:29 p.m.310 views

CVE-2019-0316

SAP NetWeaver Process Integration, versions: SAP_XIESR: 7.20, SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate user-controlled inputs, which allows an attacker possessing admin privileges to read and modify data from the victim’s browser, by injecting malicious scrip...

4.8CVSS4.9AI score0.00238EPSS
CVE
CVE
added 2021/05/11 3:15 p.m.119 views

CVE-2021-27618

The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not check the file type extension of the file uploaded from local source. An attacker could craft a malicious file and upload it to the application, which could lead to denial of s...

4.9CVSS5AI score0.00209EPSS
CVE
CVE
added 2019/06/12 3:29 p.m.81 views

CVE-2019-0305

Java Server Pages (JSPs) provided by the SAP NetWeaver Process Integration (SAP_XIESR and SAP_XITOOL: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50) do not restrict or incorrectly restrict frame objects or UI layers that belong to another application or domain, resulting in Clickjacking vulnerability....

4.3CVSS4.7AI score0.00162EPSS
CVE
CVE
added 2019/09/10 5:15 p.m.76 views

CVE-2019-0356

Under certain conditions SAP NetWeaver Process Integration Runtime Workbench – MESSAGING and SAP_XIAF (before versions 7.31, 7.40, 7.50) allows an attacker to access information which would otherwise be restricted.

4.3CVSS4.5AI score0.00197EPSS
CVE
CVE
added 2019/06/12 5:29 p.m.73 views

CVE-2019-0312

Several web pages provided SAP NetWeaver Process Integration (versions: SAP_XIESR: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 and SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50) are not password protected. An attacker could access landscape information like host names, ports or other technical da...

5.3CVSS5.3AI score0.00176EPSS
CVE
CVE
added 2022/12/13 3:15 a.m.65 views

CVE-2022-41271

An unauthenticated user can attach to an open interface exposed through JNDI by the Messaging System of SAP NetWeaver Process Integration (PI) - version 7.50. This user can make use of an open naming and directory API to access services that could perform unauthorized operations. The vulnerability ...

9.4CVSS8.7AI score0.00152EPSS
CVE
CVE
added 2019/06/12 5:29 p.m.60 views

CVE-2019-0315

Under certain conditions the PI Integration Builder Web UI of SAP NetWeaver Process Integration (versions: SAP_XIESR: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50 and SAP_XIPCK 7.10 to 7.11, 7.20, 7.30) allows an attacker to access passwords used in F...

7.5CVSS7.2AI score0.00281EPSS
CVE
CVE
added 2023/08/08 1:15 a.m.57 views

CVE-2023-37488

In SAP NetWeaver Process Integration - versions SAP_XIESR 7.50, SAP_XITOOL 7.50, SAP_XIAF 7.50, user-controlled inputs, if not sufficiently encoded, could result in Cross-Site Scripting (XSS) attack. On successful exploitation the attacker can cause limited impact on confidentiality and integrity o...

6.1CVSS6AI score0.00291EPSS
CVE
CVE
added 2022/12/13 4:15 a.m.52 views

CVE-2022-41272

An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized o...

9.9CVSS8.2AI score0.00474EPSS
CVE
CVE
added 2024/03/12 1:15 a.m.52 views

CVE-2024-28163

Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration (PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.

5.3CVSS5.4AI score0.00211EPSS
CVE
CVE
added 2019/08/14 2:15 p.m.50 views

CVE-2019-0337

Java Proxy Runtime of SAP NetWeaver Process Integration, versions 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs and allows an attacker to execute malicious scripts in the url thereby resulting in Reflected Cross-Site Scripting (XSS) vulnerability

6.1CVSS6AI score0.00248EPSS
CVE
CVE
added 2021/04/14 3:15 p.m.47 views

CVE-2021-27604

In order to prevent XML External Entity vulnerability in SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Enterprise Service Repository JAVA Mappings), versions - 7.10, 7.20, 7.30, 7.31, 7.40, 7.50, SAP recommends to refer this note.

7.7CVSS6.4AI score0.00343EPSS
CVE
CVE
added 2019/04/10 9:29 p.m.43 views

CVE-2019-0282

Several web pages in SAP NetWeaver Process Integration (Runtime Workbench), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; can be accessed without user authentication, which might expose internal data like release information, Java package and Java object names which can be misused by the ...

5.3CVSS5.2AI score0.00152EPSS
CVE
CVE
added 2019/04/10 9:29 p.m.43 views

CVE-2019-0283

SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Ax...

7.1CVSS6.9AI score0.00126EPSS
CVE
CVE
added 2021/05/11 3:15 p.m.43 views

CVE-2021-27617

The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and parsed by the application, could lead to Denial-...

4.9CVSS5AI score0.00209EPSS
CVE
CVE
added 2023/07/11 3:15 a.m.43 views

CVE-2023-35872

The Message Display Tool (MDT) of SAP NetWeaver Process Integration - version SAP_XIAF 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnera...

6.5CVSS6.7AI score0.00129EPSS
CVE
CVE
added 2023/07/11 3:15 a.m.43 views

CVE-2023-35873

The Runtime Workbench (RWB) of SAP NetWeaver Process Integration - version SAP_XITOOL 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerab...

6.5CVSS6.7AI score0.00129EPSS
CVE
CVE
added 2019/04/10 9:29 p.m.42 views

CVE-2019-0278

Under certain conditions the Monitoring Servlet of the SAP NetWeaver Process Integration (Messaging System), fixed in versions 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker to see the names of database tables used by the application, leading to information disclosure.

4.3CVSS4.3AI score0.00197EPSS
CVE
CVE
added 2021/04/14 3:15 p.m.38 views

CVE-2021-27599

SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Integration Builder Framework), versions - 7.10, 7.30, 7.31, 7.40, 7.50, allows an attacker to access information under certain conditions, which would otherwise be restricted.

6.5CVSS6.3AI score0.00234EPSS