Логотип exploitDog
bind:CVE-2020-26834
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-26834

Количество 2

Количество 2

nvd логотип

CVE-2020-26834

больше 4 лет назад

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-xwh3-6m65-fmmj

около 3 лет назад

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-26834

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

CVSS3: 5.4
0%
Низкий
больше 4 лет назад
github логотип
GHSA-xwh3-6m65-fmmj

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued.

0%
Низкий
около 3 лет назад

Уязвимостей на страницу