Логотип exploitDog
bind:CVE-2022-35227
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-35227

Количество 3

Количество 3

nvd логотип

CVE-2022-35227

больше 3 лет назад

A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-v8wf-ggw9-wxph

больше 3 лет назад

A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2022-06116

больше 3 лет назад

Уязвимость компонента WPC программной интеграционной платформы SAP NetWeaver Enterprise Portal (SAP NW EP), позволяющая нарушителю осуществить межсайтовую сценарную атаку

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-35227

A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-v8wf-ggw9-wxph

A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session.

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06116

Уязвимость компонента WPC программной интеграционной платформы SAP NetWeaver Enterprise Portal (SAP NW EP), позволяющая нарушителю осуществить межсайтовую сценарную атаку

CVSS3: 6.1
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу