Known Vulnerabilities for Netweaver As Abap by Sap

Listed below are 10 of the newest known vulnerabilities associated with "Netweaver As Abap" by "Sap".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-34257 json Due to an Open Redirect vulnerability in SAP NetWeaver Application Server ABAP, an unauthenticated attacker could craft malic... Not Provided 2026-04-14 2026-04-14
CVE-2022-39799 json An attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, re... 6.1 - MEDIUM 2022-09-13 2022-10-05
CVE-2022-35294 json An attacker with basic business user privileges could craft and upload a malicious file to SAP NetWeaver Application Server A... 5.4 - MEDIUM 2022-09-13 2022-10-05
CVE-2022-27668 json Depending on the configuration of the route permission table in file 'saprouttab', it is possible for an unauthenticated atta... 9.8 - CRITICAL 2022-06-14 2022-10-27
CVE-2022-22543 json SAP NetWeaver Application Server for ABAP (Kernel) and ABAP Platform (Kernel) - versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77,... 7.5 - HIGH 2022-02-09 2022-10-25
CVE-2022-22540 json SAP NetWeaver AS ABAP (Workplace Server) - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 787, allows a... 7.5 - HIGH 2022-02-09 2022-10-05
CVE-2022-22536 json SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP ... 10 - CRITICAL 2022-02-09 2023-09-27
CVE-2021-44231 json Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker... 9.8 - CRITICAL 2021-12-14 2022-10-05
CVE-2021-40496 json SAP Internet Communication framework (ICM) - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785, a... 4.3 - MEDIUM 2021-10-12 2022-10-06
CVE-2021-40495 json There are multiple Denial-of Service vulnerabilities in SAP NetWeaver Application Server for ABAP and ABAP Platform - version... 5.3 - MEDIUM 2021-10-12 2022-10-06

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationSapNetweaver As Abap804
ApplicationSapNetweaver As Abap782
ApplicationSapNetweaver As Abap75e
ApplicationSapNetweaver As Abap75d
ApplicationSapNetweaver As Abap75c
ApplicationSapNetweaver As Abap75b
ApplicationSapNetweaver As Abap75a
ApplicationSapNetweaver As Abap755
ApplicationSapNetweaver As Abap754
ApplicationSapNetweaver As Abap753
ApplicationSapNetweaver As Abap752
ApplicationSapNetweaver As Abap751
ApplicationSapNetweaver As Abap750
ApplicationSapNetweaver As Abap740
ApplicationSapNetweaver As Abap731
ApplicationSapNetweaver As Abap730
ApplicationSapNetweaver As Abap711
ApplicationSapNetweaver As Abap710
ApplicationSapNetweaver As Abap702
ApplicationSapNetweaver As Abap701
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report