Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v8wf-ggw9-wxph

Опубликовано: 13 июл. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.1

Описание

A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.

A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.

EPSS

Процентиль: 53%
0.00302
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
больше 3 лет назад

A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.

CVSS3: 6.1
fstec
больше 3 лет назад

Уязвимость компонента WPC программной интеграционной платформы SAP NetWeaver Enterprise Portal (SAP NW EP), позволяющая нарушителю осуществить межсайтовую сценарную атаку

EPSS

Процентиль: 53%
0.00302
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79