Netweaver Process Integration
by Sap
Standard maintenance is sufficient
Netweaver Process Integration has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
0.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 21 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2019-0328 | 7.2 | 0.9% | — |
| CVE-2022-41272 | 9.9 | 0.7% | — |
| CVE-2021-27604 | 6.5 | 0.3% | — |
| CVE-2023-37488 | 6.1 | 0.3% | — |
| CVE-2024-28163 | 5.3 | 0.3% | — |
| CVE-2019-0315 | 7.5 | 0.3% | — |
| CVE-2022-41271 | 9.4 | 0.2% | — |
| CVE-2021-27599 | 6.5 | 0.2% | — |
| CVE-2021-27617 | 4.9 | 0.2% | — |
| CVE-2021-27618 | 4.9 | 0.2% | — |
| CVE-2019-0337 | 6.1 | 0.2% | — |
| CVE-2019-0316 | 4.8 | 0.2% | — |
| CVE-2019-0278 | 4.3 | 0.2% | — |
| CVE-2019-0356 | 4.3 | 0.2% | — |
| CVE-2019-0312 | 5.3 | 0.2% | — |
| CVE-2019-0367 | 4.3 | 0.2% | — |
| CVE-2023-35873 | 6.5 | 0.2% | — |
| CVE-2023-35872 | 6.5 | 0.2% | — |
| CVE-2019-0305 | 4.3 | 0.2% | — |
| CVE-2019-0282 | 5.3 | 0.2% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.