{"vulnerability": "CVE-2021-42064", "sightings": [{"uuid": "03abe96d-9c3d-41f1-b278-ec116803f33d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42064", "type": "seen", "source": "https://t.me/cibsecurity/33940", "content": "\u203c CVE-2021-42064 \u203c\n\nIf configured to use an Oracle database and if a query is created using the flexible search java api with a parameterized \"in\" clause, SAP Commerce - versions 1905, 2005, 2105, 2011, allows attacker to execute crafted database queries, exposing backend database. The vulnerability is present if the parameterized \"in\" clause accepts more than 1000 values.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-14T18:15:30.000000Z"}]}