cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-29618,https://securityvulnerability.io/vulnerability/CVE-2022-29618,,"Due to insufficient input validation, SAP NetWeaver Development Infrastructure (Design Time Repository) - versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to inject script into the URL and execute code in the user’s browser. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.",SAP,SAP Netweaver Development Infrastructure (design Time Repository),6.1,MEDIUM,0.000910000002477318,false,false,false,false,,false,false,2022-06-14T18:35:37.000Z,0 CVE-2021-33691,https://securityvulnerability.io/vulnerability/CVE-2021-33691,,"NWDI Notification Service versions - 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.SAP NetWeaver Development Infrastructure Notification Service allows a threat actor to send crafted scripts to a victim. If the victim has an active session when the crafted script gets executed, the threat actor could compromise information in victims session, and gain access to some sensitive information also.",SAP,SAP Netweaver Development Infrastructure (notification Service),6.9,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2021-09-15T18:01:48.000Z,0 CVE-2021-33690,https://securityvulnerability.io/vulnerability/CVE-2021-33690,,"Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.",SAP,SAP Netweaver Development Infrastructure (component Build Service),9.9,CRITICAL,0.5298500061035156,false,false,false,true,true,false,false,2021-09-15T18:01:41.000Z,0 CVE-2018-2428,https://securityvulnerability.io/vulnerability/CVE-2018-2428,,"Under certain conditions SAP UI5 Handler allows an attacker to access information which would otherwise be restricted. Software components affected are: SAP Infrastructure 1.0, SAP UI 7.4, 7.5, 7.51, 7.52 and version 2.0 of SAP UI for SAP NetWeaver 7.00.",SAP,"SAP Infrastructure,SAP Ui,SAP Ui For SAP Netweaver 7.00",5.3,MEDIUM,0.0013500000350177288,false,false,false,false,,false,false,2018-06-12T15:00:00.000Z,0 CVE-2018-2399,https://securityvulnerability.io/vulnerability/CVE-2018-2399,,"Cross-Site Scripting in Process Monitoring Infrastructure, from 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, due to inefficient encoding of user controlled inputs.",SAP,SAP Process Monitoring Infrastructure,6.1,MEDIUM,0.0011699999449774623,false,false,false,false,,false,false,2018-03-14T19:00:00.000Z,0