Логотип exploitDog
bind:CVE-2024-47588
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-47588

Количество 3

Количество 3

nvd логотип

CVE-2024-47588

около 1 года назад

In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability.

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-v4pq-9h29-fmjc

около 1 года назад

In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability.

CVSS3: 4.7
EPSS: Низкий
fstec логотип

BDU:2024-10526

около 1 года назад

Уязвимость менеджера обновлений программного обеспечения SAP NetWeaver Java, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-47588

In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability.

CVSS3: 4.7
0%
Низкий
около 1 года назад
github логотип
GHSA-v4pq-9h29-fmjc

In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability.

CVSS3: 4.7
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-10526

Уязвимость менеджера обновлений программного обеспечения SAP NetWeaver Java, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.7
0%
Низкий
около 1 года назад

Уязвимостей на страницу