Логотип exploitDog
bind:CVE-2021-38176
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-38176

Количество 2

Количество 2

nvd логотип

CVE-2021-38176

больше 4 лет назад

Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query or inject ABAP code to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-4qx6-hc3f-6gj9

больше 3 лет назад

Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-38176

Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query or inject ABAP code to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.

CVSS3: 8.8
1%
Низкий
больше 4 лет назад
github логотип
GHSA-4qx6-hc3f-6gj9

Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу