{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T03:47:55.382","vulnerabilities":[{"cve":{"id":"CVE-2013-5751","sourceIdentifier":"cve@mitre.org","published":"2013-09-16T19:14:40.037","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in SAP NetWeaver 7.x allows remote attackers to read arbitrary files via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de recorrido de  directorios en SAP  NetWeaver 7.x permite a atacantes remotos leer ficheros arbitrarios a través de vectores no especificados"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.0:*:*:*:*:*:*:*","matchCriteriaId":"41FAC5DD-D577-47F9-B0CA-006032256642"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.0:ehp1:*:*:*:*:*:*","matchCriteriaId":"9FC1767F-10BD-468B-8D2B-538C82EB69B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.0:ehp2:*:*:*:*:*:*","matchCriteriaId":"D04DC424-129B-448D-994B-7AC5D9B64703"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.0:sp15:*:*:*:*:*:*","matchCriteriaId":"ABEE6BE3-556F-4A1E-8FA3-CD5E5C1D42E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.0:sp8:*:*:*:*:*:*","matchCriteriaId":"73914503-E9AA-4382-85FC-B0DD45ABDD77"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.01:*:*:*:*:*:*:*","matchCriteriaId":"2794A7DB-D5B8-467E-93F4-D65245FF187D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.02:*:*:*:*:*:*:*","matchCriteriaId":"A9805246-77E5-456C-B7CF-07CFF2F9F069"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.03:*:*:*:*:*:*:*","matchCriteriaId":"369D0212-65DA-4121-981B-1F07B7465F97"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.10:*:*:*:*:*:*:*","matchCriteriaId":"EDFFDB95-B956-4B22-81F4-A4074D49D4A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*","matchCriteriaId":"606EFE4F-57A4-44E2-A98D-F0867A658218"}]}]}],"references":[{"url":"http://en.securitylab.ru/lab/PT-2012-24","source":"cve@mitre.org"},{"url":"http://osvdb.org/97350","source":"cve@mitre.org"},{"url":"http://scn.sap.com/docs/DOC-8218","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/54809","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/62391","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/87121","source":"cve@mitre.org"},{"url":"https://websmp230.sap-ag.de/sap/support/notes/1779578","source":"cve@mitre.org"},{"url":"http://en.securitylab.ru/lab/PT-2012-24","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://osvdb.org/97350","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://scn.sap.com/docs/DOC-8218","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/54809","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/62391","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/87121","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://websmp230.sap-ag.de/sap/support/notes/1779578","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}