{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T20:39:49.129","vulnerabilities":[{"cve":{"id":"CVE-2020-6319","sourceIdentifier":"cna@sap.com","published":"2020-10-15T02:15:12.593","lastModified":"2024-11-21T05:35:30.093","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SAP NetWeaver Application Server Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 allows an unauthenticated attacker to include JavaScript blocks in any web page or URL with different symbols which are otherwise not allowed. On successful exploitation an attacker can steal authentication information of the user, such as data relating to his or her current session and limitedly impact confidentiality and integrity of the application, leading to Reflected Cross Site Scripting."},{"lang":"es","value":"SAP NetWeaver Application Server Java, versiones - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40 y 7.50, permite a un atacante no autenticado incluir bloques de JavaScript en cualquier página web o URL con diferentes símbolos que de otro modo no están permitidos.&#xa0;En una explotación con éxito, un atacante puede robar información de autenticación del usuario, tal y como datos relacionados con su sesión actual e impactar de manera limitada la confidencialidad e integridad de la aplicación, conllevando a una vulnerabilidad de tipo Cross Site Scripting Reflejado"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV30":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_java:7.10:*:*:*:*:*:*:*","matchCriteriaId":"D60371A7-F8F4-46F8-9659-DD4EE84B81EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_java:7.11:*:*:*:*:*:*:*","matchCriteriaId":"C6B085AF-8CEE-4A87-B381-F36C989FB2A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*","matchCriteriaId":"43A28C48-4325-4694-88B1-FEE46EBFB0A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*","matchCriteriaId":"24A1E0B9-8C28-41BC-B050-237B5F929C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*","matchCriteriaId":"EEAE6C2A-821F-4123-BD56-0FDADF9D63C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*","matchCriteriaId":"F5308FCE-8B2C-4B4D-BEE7-3CF544570B68"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*","matchCriteriaId":"9C506445-3787-4BFF-A98B-7502A0F7CF80"}]}]}],"references":[{"url":"https://launchpad.support.sap.com/#/notes/2956398","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196","source":"cna@sap.com","tags":["Vendor Advisory"]},{"url":"https://launchpad.support.sap.com/#/notes/2956398","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}