Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7gm9-wv4c-x6h8

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.

The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.

EPSS

Процентиль: 58%
0.00363
Низкий

Связанные уязвимости

nvd
почти 22 года назад

The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.

EPSS

Процентиль: 58%
0.00363
Низкий