cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-28163,https://securityvulnerability.io/vulnerability/CVE-2024-28163,Low Impact on Confidentiality: SAP NetWeaver Process Integration Support Web Pages Vulnerability,"Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration (PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application. ",SAP,SAP Netweaver Process Integration (support Web Pages),5.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-03-12T00:45:42.419Z,0 CVE-2023-37488,https://securityvulnerability.io/vulnerability/CVE-2023-37488,Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Process Integration,"In SAP NetWeaver Process Integration - versions SAP_XIESR 7.50, SAP_XITOOL 7.50, SAP_XIAF 7.50, user-controlled inputs, if not sufficiently encoded, could result in Cross-Site Scripting (XSS) attack. On successful exploitation the attacker can cause limited impact on confidentiality and integrity of the system. ",SAP,SAP Netweaver Process Integration,6.1,MEDIUM,0.000750000006519258,false,false,false,false,,false,false,2023-08-08T01:15:00.000Z,0 CVE-2023-35872,https://securityvulnerability.io/vulnerability/CVE-2023-35872,Missing Authentication check in SAP NetWeaver Process Integration (Message Display Tool),"The Message Display Tool (MDT) of SAP NetWeaver Process Integration - version SAP_XIAF 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application. ",SAP,SAP Netweaver Process Integration (message Display Tool),6.5,MEDIUM,0.0009500000160187483,false,false,false,false,,false,false,2023-07-11T03:15:00.000Z,0 CVE-2023-35873,https://securityvulnerability.io/vulnerability/CVE-2023-35873,Missing Authentication check in SAP NetWeaver Process Integration (Runtime Workbench),"The Runtime Workbench (RWB) of SAP NetWeaver Process Integration - version SAP_XITOOL 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application. ",SAP,SAP Netweaver Process Integration (runtime Workbench),6.5,MEDIUM,0.0009500000160187483,false,false,false,false,,false,false,2023-07-11T03:15:00.000Z,0 CVE-2019-0367,https://securityvulnerability.io/vulnerability/CVE-2019-0367,,"SAP NetWeaver Process Integration (B2B Toolkit), before versions 1.0 and 2.0, does not perform necessary authorization checks for an authenticated user, allowing the import of B2B table content that leads to Missing Authorization Check.",SAP,SAP Netweaver Process Integration (b2b Toolkit),4.3,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2019-10-08T19:16:25.000Z,0 CVE-2019-0356,https://securityvulnerability.io/vulnerability/CVE-2019-0356,,"Under certain conditions SAP NetWeaver Process Integration Runtime Workbench – MESSAGING and SAP_XIAF (before versions 7.31, 7.40, 7.50) allows an attacker to access information which would otherwise be restricted.",SAP,SAP Netweaver Process Integration Runtime Workbench – Messaging And SAP Xiaf,4.3,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2019-09-10T16:27:52.000Z,0 CVE-2019-0337,https://securityvulnerability.io/vulnerability/CVE-2019-0337,,"Java Proxy Runtime of SAP NetWeaver Process Integration, versions 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs and allows an attacker to execute malicious scripts in the url thereby resulting in Reflected Cross-Site Scripting (XSS) vulnerability",SAP,SAP Netweaver Process Integration (java Proxy Runtime),6.1,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2019-08-14T13:47:00.000Z,0 CVE-2019-0328,https://securityvulnerability.io/vulnerability/CVE-2019-0328,,"ABAP Tests Modules (SAP Basis, versions 7.0, 7.1, 7.3, 7.31, 7.4, 7.5) of SAP NetWeaver Process Integration enables an attacker the execution of OS commands with privileged rights. An attacker could thereby impact the integrity and availability of the system.",SAP,SAP Netweaver Process Integration Abap Tests (SAP Basis),7.2,HIGH,0.01042999979108572,false,false,false,false,,false,false,2019-07-10T19:10:37.000Z,0 CVE-2019-0316,https://securityvulnerability.io/vulnerability/CVE-2019-0316,,"SAP NetWeaver Process Integration, versions: SAP_XIESR: 7.20, SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate user-controlled inputs, which allows an attacker possessing admin privileges to read and modify data from the victim’s browser, by injecting malicious scripts in certain servlets, which will be executed when the victim is tricked to click on those malicious links, resulting in reflected Cross Site Scripting vulnerability.",SAP,"SAP Netweaver Process Integration(SAP Xiesr),SAP Netweaver Process Integration(SAP Xitool)",4.8,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2019-06-14T18:50:55.000Z,0 CVE-2019-0315,https://securityvulnerability.io/vulnerability/CVE-2019-0315,,"Under certain conditions the PI Integration Builder Web UI of SAP NetWeaver Process Integration (versions: SAP_XIESR: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50 and SAP_XIPCK 7.10 to 7.11, 7.20, 7.30) allows an attacker to access passwords used in FTP channels leading to information disclosure.",SAP,"SAP Netweaver Process Integration(SAP Xiesr),SAP Netweaver Process Integration(SAP Xitool),SAP Netweaver Process Integration(SAP Xipck)",7.5,HIGH,0.0017800000496208668,false,false,false,false,,false,false,2019-06-12T16:11:08.000Z,0 CVE-2019-0312,https://securityvulnerability.io/vulnerability/CVE-2019-0312,,"Several web pages provided SAP NetWeaver Process Integration (versions: SAP_XIESR: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 and SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50) are not password protected. An attacker could access landscape information like host names, ports or other technical data in the absence of restrictive firewall and port settings.",SAP,"SAP Netweaver Process Integration(SAP Xiesr),SAP Netweaver Process Integration(SAP Xitool)",5.3,MEDIUM,0.0008999999845400453,false,false,false,false,,false,false,2019-06-12T16:11:08.000Z,0 CVE-2019-0305,https://securityvulnerability.io/vulnerability/CVE-2019-0305,,"Java Server Pages (JSPs) provided by the SAP NetWeaver Process Integration (SAP_XIESR and SAP_XITOOL: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50) do not restrict or incorrectly restrict frame objects or UI layers that belong to another application or domain, resulting in Clickjacking vulnerability. Successful exploitation of this vulnerability leads to unwanted modification of user's data.",SAP,SAP Netweaver Process Integration(SAP Xiesr And SAP Xitool),4.3,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2019-06-12T14:21:39.000Z,0 CVE-2019-0283,https://securityvulnerability.io/vulnerability/CVE-2019-0283,,"SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document.",SAP,SAP Netweaver Process Integration (adapter Engine),7.1,HIGH,0.000539999979082495,false,false,false,false,,false,false,2019-04-10T20:23:32.000Z,0 CVE-2019-0282,https://securityvulnerability.io/vulnerability/CVE-2019-0282,,"Several web pages in SAP NetWeaver Process Integration (Runtime Workbench), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; can be accessed without user authentication, which might expose internal data like release information, Java package and Java object names which can be misused by the attacker.",SAP,SAP Netweaver Process Integration (runtime Workbench),5.3,MEDIUM,0.0008900000248104334,false,false,false,false,,false,false,2019-04-10T20:19:41.000Z,0 CVE-2019-0278,https://securityvulnerability.io/vulnerability/CVE-2019-0278,,"Under certain conditions the Monitoring Servlet of the SAP NetWeaver Process Integration (Messaging System), fixed in versions 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker to see the names of database tables used by the application, leading to information disclosure.",SAP,SAP Netweaver Process Integration (messaging System),4.3,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2019-04-10T20:13:45.000Z,0