Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gpm8-6j9v-6v7f

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The default installation of SAP R/3, when using Oracle and SQL*net V2 3.x, 4.x, and 6.10, allows remote attackers to obtain arbitrary, sensitive SAP data by directly connecting to the Oracle database and executing queries against the database, which is not password-protected.

The default installation of SAP R/3, when using Oracle and SQL*net V2 3.x, 4.x, and 6.10, allows remote attackers to obtain arbitrary, sensitive SAP data by directly connecting to the Oracle database and executing queries against the database, which is not password-protected.

EPSS

Процентиль: 79%
0.01257
Низкий

Связанные уязвимости

nvd
почти 22 года назад

The default installation of SAP R/3, when using Oracle and SQL*net V2 3.x, 4.x, and 6.10, allows remote attackers to obtain arbitrary, sensitive SAP data by directly connecting to the Oracle database and executing queries against the database, which is not password-protected.

EPSS

Процентиль: 79%
0.01257
Низкий