<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									CVE-2023-0013 - Common Vulnerabilities and Exposures				            </title>
            <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2023-0013/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Mon, 11 May 2026 04:59:25 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2023-0013</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2023-0013/#post-67</link>
                        <pubDate>Tue, 21 Feb 2023 16:24:21 +0000</pubDate>
                        <description><![CDATA[Description :-
The ABAP Keyword Documentation of SAP NetWeaver Application Server - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, for ABAP and ABAP Platform does not suffi...]]></description>
                        <content:encoded><![CDATA[<p><strong>Description :-</strong></p>
<p>The ABAP Keyword Documentation of SAP NetWeaver Application Server - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, for ABAP and ABAP Platform does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. On successful exploitation an attacker can cause limited impact on confidentiality and integrity of the application.</p>
<p> </p>
<p><strong>References :-</strong></p>
<ul>
<li><a href="https://launchpad.support.sap.com/#/notes/3283283" target="_blank" rel="noopener">MISC:https://launchpad.support.sap.com/#/notes/3283283</a></li>
<li><a href="https://launchpad.support.sap.com/#/notes/3283283" target="_blank" rel="noopener">URL:https://launchpad.support.sap.com/#/notes/3283283</a></li>
<li><a href="https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener">MISC:https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html</a></li>
<li><a href="https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener">URL:https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html</a></li>
</ul>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/common-vulnerabilities-and-exposures/">Common Vulnerabilities and Exposures</category>                        <dc:creator>143 World</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2023-0013/#post-67</guid>
                    </item>
							        </channel>
        </rss>
		