Vulnerabilities > SAP > Netweaver Application Server FOR Java > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-07-11 | CVE-2023-31405 | Improper Output Neutralization for Logs vulnerability in SAP Netweaver Application Server for Java 7.50 SAP NetWeaver AS for Java - versions ENGINEAPI 7.50, SERVERCORE 7.50, J2EE-APPS 7.50, allows an unauthenticated attacker to craft a request over the network which can result in unwarranted modifications to a system log without user interaction. | 5.3 |
2023-03-14 | CVE-2023-26460 | Improper Access Control vulnerability in SAP Netweaver Application Server for Java 7.50 Cache Management Service in SAP NetWeaver Application Server for Java - version 7.50, does not perform any authentication checks for functionalities that require user identity | 5.3 |
2023-03-14 | CVE-2023-27268 | Improper Access Control vulnerability in SAP Netweaver Application Server for Java 7.50 SAP NetWeaver AS Java (Object Analyzing Service) - version 7.50, does not perform necessary authorization checks, allowing an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access a service which will enable them to access but not modify server settings and data with no effect on availability., resulting in escalation of privileges. | 5.3 |
2021-06-09 | CVE-2021-27621 | Unspecified vulnerability in SAP Netweaver Application Server for Java Information Disclosure vulnerability in UserAdmin application in SAP NetWeaver Application Server for Java, versions - 7.11,7.20,7.30,7.31,7.40 and 7.50 allows attackers to access restricted information by entering malicious server name. | 4.9 |
2021-06-09 | CVE-2021-27635 | XXE vulnerability in SAP Netweaver Application Server for Java SAP NetWeaver AS for JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker authenticated as an administrator to connect over a network and submit a specially crafted XML file in the application because of missing XML Validation, this vulnerability enables attacker to fully compromise confidentiality by allowing them to read any file on the filesystem or fully compromise availability by causing the system to crash. | 6.5 |