4 results (0.004 seconds)

CVSS: 10.0EPSS: 35%CPEs: 3EXPL: 2

Stack-based buffer overflow in serv.exe in SAP MaxDB 7.4.3.32, and 7.6.0.37 through 7.6.06 allows remote attackers to execute arbitrary code via an invalid length parameter in a handshake packet to TCP port 7210. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer basado en pila en serv.exe de SAP MaxDB v7.4.3.32, y v7.6.0.37 hasta la v7.6.06. Permite a atacantes remotos ejecutar código de su elección a través de un parámetro de longitud inválido en un paquete de "handshake" (establecimiento de conexión) al puerto TCP 7210. NOTA: algunos de estos detalles han sido obtenidos de información de terceras partes. • https://www.exploit-db.com/exploits/11886 http://osvdb.org/63047 http://secunia.com/advisories/38955 http://www.securityfocus.com/archive/1/510125/100/0/threaded http://www.securityfocus.com/bid/38769 http://www.securitytracker.com/id?1023719 http://www.vupen.com/english/advisories/2010/0643 http://www.zerodayinitiative.com/advisories/ZDI-10-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/56950 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 5%CPEs: 1EXPL: 0

Integer signedness error in vserver in SAP MaxDB 7.6.0.37, and possibly other versions, allows remote attackers to execute arbitrary code via unknown vectors that trigger heap corruption. Error de presencia de signo en entero en vserver en SAP MaxDB 7.6.0.37, y posiblemente otras versiones permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados que disparan una corrupción de pila. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=669 http://secunia.com/advisories/29312 http://www.securityfocus.com/bid/28183 http://www.securitytracker.com/id?1019571 http://www.vupen.com/english/advisories/2008/0844/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41107 • CWE-189: Numeric Errors •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

sdbstarter in SAP MaxDB 7.6.0.37, and possibly other versions, allows local users to execute arbitrary commands by using unspecified environment variables to modify configuration settings. sdbstarter en SAP MaxDB 7.6.0.37, y posiblemente en otras versiones, permite a usuarios locales ejecutar comandos de su elección mediante utilizando variables de entorno no especificadas para mnodificar parámetros de configuración. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=670 http://secunia.com/advisories/29312 http://www.securityfocus.com/bid/28185 http://www.securitytracker.com/id?1019570 http://www.vupen.com/english/advisories/2008/0844/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41104 •

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 3

SAP MaxDB 7.6.03 build 007 and earlier allows remote attackers to execute arbitrary commands via "&&" and other shell metacharacters in exec_sdbinfo and other unspecified commands, which are executed when MaxDB invokes cons.exe. SAP MaxDB 7.6.03 build 007 y versiones anteriores, permite que atacantes remotos ejecuten comandos arbitrarios usando "$$", además de otros metacarateres del intéprete de comandos (shell) en exec_sdbinfo, y de otros comandos no especificados, que se ejecutan cuando MaxDB invoca a cons.exe SAP MaxDB is prone to a remote command-injection vulnerability because the application fails to properly sanitize user-supplied input. • https://www.exploit-db.com/exploits/4877 http://aluigi.altervista.org/adv/sapone-adv.txt http://secunia.com/advisories/28409 http://securityreason.com/securityalert/3536 http://www.securityfocus.com/archive/1/486039/100/0/threaded http://www.securityfocus.com/bid/27206 http://www.securitytracker.com/id?1019171 http://www.vupen.com/english/advisories/2008/0104 https://exchange.xforce.ibmcloud.com/vulnerabilities/39573 - • CWE-20: Improper Input Validation •