Количество 3
Количество 3
CVE-2026-0500
Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
GHSA-9m57-5mv3-fjx3
Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
BDU:2026-00343
Уязвимость приложения для углубленного анализа, создания пользовательских панелей мониторинга и детального изучения метрик Workstation сервера для сбора, хранения и отображения данных о производительности систем SAP SAP Wily Introscope Enterprise Manager (EM), позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-0500 Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system. | CVSS3: 9.6 | 0% Низкий | 27 дней назад | |
GHSA-9m57-5mv3-fjx3 Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system. | CVSS3: 9.6 | 0% Низкий | 27 дней назад | |
BDU:2026-00343 Уязвимость приложения для углубленного анализа, создания пользовательских панелей мониторинга и детального изучения метрик Workstation сервера для сбора, хранения и отображения данных о производительности систем SAP SAP Wily Introscope Enterprise Manager (EM), позволяющая нарушителю выполнить произвольный код | CVSS3: 9.6 | 0% Низкий | 27 дней назад |
Уязвимостей на страницу