{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:24:10.365","vulnerabilities":[{"cve":{"id":"CVE-2020-6262","sourceIdentifier":"cna@sap.com","published":"2020-05-12T18:15:14.850","lastModified":"2024-11-21T05:35:24.010","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Service Data Download in SAP Application Server ABAP (ST-PI, before versions 2008_1_46C, 2008_1_620, 2008_1_640, 2008_1_700, 2008_1_710, 740) allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application and the whole ABAP system leading to Code Injection."},{"lang":"es","value":"Service Data Download en SAP Application Server ABAP (ST-PI, versiones anteriores a 2008_1_46C, 2008_1_620, 2008_1_640, 2008_1_700, 2008_1_710, 740), permite a un atacante inyectar código que puede ser ejecutado por la aplicación. Un atacante podría así controlar el comportamiento de la aplicación y de todo el sistema ABAP conllevando a una inyección de código."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:application_server:740:*:*:*:*:*:*:*","matchCriteriaId":"E9BAB482-B7A5-47CC-92BD-250294B5570A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:application_server:2008_1_46c:*:*:*:*:*:*:*","matchCriteriaId":"E2CE901C-0E61-47E3-A16D-52BDCC0EBFA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:application_server:2008_1_620:*:*:*:*:*:*:*","matchCriteriaId":"836C14DC-888B-4FF1-80E7-B9F9330FE425"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:application_server:2008_1_640:*:*:*:*:*:*:*","matchCriteriaId":"07DA7FF8-E20C-4926-8C04-ED29F405EE2A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:application_server:2008_1_700:*:*:*:*:*:*:*","matchCriteriaId":"D8415C2F-D676-4140-A8E2-380339558D89"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:application_server:2008_1_710:*:*:*:*:*:*:*","matchCriteriaId":"AECA3EDA-A5F5-49D6-810B-D292D1070C33"}]}]}],"references":[{"url":"https://launchpad.support.sap.com/#/notes/2835979","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222","source":"cna@sap.com","tags":["Vendor Advisory"]},{"url":"https://launchpad.support.sap.com/#/notes/2835979","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}