Vulnerability Details CVE-2021-44231
Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.0%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2021-44231
-
cpe:2.3:a:sap:abap_platform:701
-
cpe:2.3:a:sap:abap_platform:740
-
cpe:2.3:a:sap:abap_platform:750
-
cpe:2.3:a:sap:abap_platform:751
-
cpe:2.3:a:sap:abap_platform:752
-
cpe:2.3:a:sap:abap_platform:753
-
cpe:2.3:a:sap:abap_platform:754
-
cpe:2.3:a:sap:abap_platform:755
-
cpe:2.3:a:sap:abap_platform:756
-
cpe:2.3:a:sap:abap_platform:804
-
cpe:2.3:a:sap:netweaver_application_server_abap:701
-
cpe:2.3:a:sap:netweaver_application_server_abap:740
-
cpe:2.3:a:sap:netweaver_application_server_abap:750
-
cpe:2.3:a:sap:netweaver_application_server_abap:751
-
cpe:2.3:a:sap:netweaver_application_server_abap:752
-
cpe:2.3:a:sap:netweaver_application_server_abap:753
-
cpe:2.3:a:sap:netweaver_application_server_abap:754
-
cpe:2.3:a:sap:netweaver_application_server_abap:755
-
cpe:2.3:a:sap:netweaver_application_server_abap:756
-
cpe:2.3:a:sap:netweaver_application_server_abap:804