Логотип exploitDog
bind:CVE-2026-0504
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-0504

Количество 3

Количество 3

nvd логотип

CVE-2026-0504

27 дней назад

Due to insufficient input handling, the SAP Identity Management REST interface allows an authenticated administrator to submit specially crafted malicious REST requests that are processed by JNDI operations without adequate input neutralization. This may lead to limited disclosure or modification of data, resulting in low impact on confidentiality and integrity, with no impact on application availability.

CVSS3: 3.8
EPSS: Низкий
github логотип

GHSA-jm7g-m582-79q7

27 дней назад

Due to insufficient input handling, the SAP Identity Management REST interface allows an authenticated administrator to submit specially crafted malicious REST requests that are processed by JNDI operations without adequate input neutralization. This may lead to limited disclosure or modification of data, resulting in low impact on confidentiality and integrity, with no impact on application availability.

CVSS3: 3.8
EPSS: Низкий
fstec логотип

BDU:2026-00361

27 дней назад

Уязвимость интерфейса REST Interface Version 2 средства для управления идентификацией пользователей SAP Identity Management, позволяющая нарушителю получить доступ на чтение и изменение данных

CVSS3: 3.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-0504

Due to insufficient input handling, the SAP Identity Management REST interface allows an authenticated administrator to submit specially crafted malicious REST requests that are processed by JNDI operations without adequate input neutralization. This may lead to limited disclosure or modification of data, resulting in low impact on confidentiality and integrity, with no impact on application availability.

CVSS3: 3.8
0%
Низкий
27 дней назад
github логотип
GHSA-jm7g-m582-79q7

Due to insufficient input handling, the SAP Identity Management REST interface allows an authenticated administrator to submit specially crafted malicious REST requests that are processed by JNDI operations without adequate input neutralization. This may lead to limited disclosure or modification of data, resulting in low impact on confidentiality and integrity, with no impact on application availability.

CVSS3: 3.8
0%
Низкий
27 дней назад
fstec логотип
BDU:2026-00361

Уязвимость интерфейса REST Interface Version 2 средства для управления идентификацией пользователей SAP Identity Management, позволяющая нарушителю получить доступ на чтение и изменение данных

CVSS3: 3.8
0%
Низкий
27 дней назад

Уязвимостей на страницу