The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of NetWeaver

Apache Tomcat: code execution via Enabled AJP Connector
An attacker can use a vulnerability via Enabled AJP Connector of Apache Tomcat, in order to run code...
bulletinapr2020, CERTFR-2020-AVI-112, cpujul2020, CVE-2020-1938, DLA-2133-1, DLA-2209-1, DSA-4673-1, DSA-4680-1, FEDORA-2020-04ac174fa9, FEDORA-2020-c870aa8378, HPESBUX04015, openSUSE-SU-2020:0345-1, openSUSE-SU-2020:0597-1, RHSA-2020:0855-01, RHSA-2020:0912-01, RHSA-2020:1478-01, RHSA-2020:1479-01, RHSA-2020:2779-01, RHSA-2020:2780-01, RHSA-2020:2781-01, RHSA-2020:2783-01, RHSA-2020:2840-01, SUSE-SU-2020:0598-1, SUSE-SU-2020:0631-1, SUSE-SU-2020:0632-1, SUSE-SU-2020:0725-1, SUSE-SU-2020:1111-1, SUSE-SU-2020:1126-1, SUSE-SU-2020:1272-1, SUSE-SU-2020:14342-1, VIGILANCE-VUL-31664
CKEditor: Cross Site Scripting via HTML Data Processor
An attacker can trigger a Cross Site Scripting via HTML Data Processor of CKEditor, in order to run JavaScript code in the context of the web site...
cpuoct2020, CVE-2020-9281, VIGILANCE-VUL-33637
SAP: multiple vulnerabilities of September 2020
An attacker can use several vulnerabilities of SAP products...
CERTFR-2020-AVI-549, CVE-2020-6207, CVE-2020-6283, CVE-2020-6288, CVE-2020-6302, CVE-2020-6311, CVE-2020-6312, CVE-2020-6313, CVE-2020-6314, CVE-2020-6317, CVE-2020-6318, CVE-2020-6320, CVE-2020-6321, CVE-2020-6322, CVE-2020-6324, CVE-2020-6325, CVE-2020-6326, CVE-2020-6327, CVE-2020-6328, CVE-2020-6329, CVE-2020-6330, CVE-2020-6331, CVE-2020-6332, CVE-2020-6333, CVE-2020-6334, CVE-2020-6335, CVE-2020-6336, CVE-2020-6337, CVE-2020-6338, CVE-2020-6339, CVE-2020-6340, CVE-2020-6341, CVE-2020-6342, CVE-2020-6343, CVE-2020-6344, CVE-2020-6345, CVE-2020-6346, CVE-2020-6347, CVE-2020-6348, CVE-2020-6349, CVE-2020-6350, CVE-2020-6351, CVE-2020-6352, CVE-2020-6353, CVE-2020-6354, CVE-2020-6355, CVE-2020-6356, CVE-2020-6357, CVE-2020-6358, CVE-2020-6359, CVE-2020-6360, CVE-2020-6361, VIGILANCE-VUL-33265, ZDI-20-1135, ZDI-20-1136, ZDI-20-1137, ZDI-20-1138, ZDI-20-1139, ZDI-20-1140, ZDI-20-1141, ZDI-20-1142, ZDI-20-1143, ZDI-20-1144, ZDI-20-1145, ZDI-20-1146, ZDI-20-1147, ZDI-20-1148, ZDI-20-1149, ZDI-20-1150, ZDI-20-1151, ZDI-20-1152, ZDI-20-1153, ZDI-20-1154, ZDI-20-1155, ZDI-20-1156, ZDI-20-1157, ZDI-20-1158, ZDI-20-1159, ZDI-20-1160, ZDI-20-1161, ZDI-20-1162, ZDI-20-1163, ZDI-20-1164, ZDI-20-1165, ZDI-20-1166, ZDI-20-1167, ZDI-20-1168, ZDI-20-1169, ZDI-20-1170, ZDI-20-1171, ZDI-20-1172
Apache Struts: denial of service via Read Only Upload
An attacker can trigger a fatal error via Read Only Upload of Apache Struts, in order to trigger a denial of service...
CERTFR-2020-AVI-5, CERTFR-2020-AVI-578, cpuapr2021, CVE-2019-0233, K35226442, S2-060, VIGILANCE-VUL-33074
Apache Struts: code execution via Double OGNL Evaluation
An attacker can use a vulnerability via Double OGNL Evaluation of Apache Struts, in order to run code...
CERTFR-2020-AVI-509, cpuapr2021, CVE-2019-0230, S2-059, VIGILANCE-VUL-33073
SAP: multiple vulnerabilities of August 2020
An attacker can use several vulnerabilities of SAP products...
CERTFR-2020-AVI-495, CVE-2020-6273, CVE-2020-6284, CVE-2020-6287, CVE-2020-6293, CVE-2020-6294, CVE-2020-6295, CVE-2020-6296, CVE-2020-6297, CVE-2020-6298, CVE-2020-6299, CVE-2020-6300, CVE-2020-6301, CVE-2020-6309, CVE-2020-6310, VIGILANCE-VUL-33047
SAP: multiple vulnerabilities of July 2020
An attacker can use several vulnerabilities of SAP products...
CERTFR-2020-AVI-432, CVE-2020-6267, CVE-2020-6276, CVE-2020-6278, CVE-2020-6280, CVE-2020-6281, CVE-2020-6282, CVE-2020-6285, CVE-2020-6286, CVE-2020-6287, CVE-2020-6289, CVE-2020-6290, CVE-2020-6291, CVE-2020-6292, VIGILANCE-VUL-32835
SAP: multiple vulnerabilities of June 2020
An attacker can use several vulnerabilities of SAP products...
CERTFR-2020-AVI-350, CVE-2020-6239, CVE-2020-6246, CVE-2020-6260, CVE-2020-6263, CVE-2020-6264, CVE-2020-6265, CVE-2020-6266, CVE-2020-6268, CVE-2020-6269, CVE-2020-6270, CVE-2020-6271, CVE-2020-6275, CVE-2020-6279-REJECT, VIGILANCE-VUL-32470
SAP: multiple vulnerabilities of May 2020
An attacker can use several vulnerabilities of SAP products...
CERTFR-2020-AVI-283, CVE-2020-6240, CVE-2020-6241, CVE-2020-6242, CVE-2020-6243, CVE-2020-6244, CVE-2020-6245, CVE-2020-6247, CVE-2020-6248, CVE-2020-6249, CVE-2020-6250, CVE-2020-6251, CVE-2020-6252, CVE-2020-6253, CVE-2020-6254, CVE-2020-6256, CVE-2020-6257, CVE-2020-6258, CVE-2020-6259, CVE-2020-6262, VIGILANCE-VUL-32236
SAP: multiple vulnerabilities of April 2020
An attacker can use several vulnerabilities of SAP products...
CVE-2019-0330, CVE-2020-6195, CVE-2020-6208, CVE-2020-6210, CVE-2020-6211, CVE-2020-6212, CVE-2020-6213, CVE-2020-6214, CVE-2020-6215, CVE-2020-6216, CVE-2020-6217, CVE-2020-6218, CVE-2020-6219, CVE-2020-6220, CVE-2020-6221, CVE-2020-6222, CVE-2020-6223, CVE-2020-6224, CVE-2020-6225, CVE-2020-6226, CVE-2020-6227, CVE-2020-6228, CVE-2020-6229, CVE-2020-6230, CVE-2020-6231, CVE-2020-6232, CVE-2020-6233, CVE-2020-6234, CVE-2020-6235, CVE-2020-6236, CVE-2020-6237, CVE-2020-6238, VIGILANCE-VUL-32012
Our database contains other pages. You can request a free trial to read them.

Display information about NetWeaver: