Page 13 of 85 results (0.003 seconds)

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

The Extended Application Services (aka XS or XS Engine) in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to "HTTP Login," aka SAP Security Note 2197397. Extended Application Services (también conocido como XS o XS Engine) en SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a atacantes remotos ejecutar código arbitrario a través de vectores no especificados relacionados con 'HTTP Login,' también conocida como SAP Security Note 2197397. • http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html http://seclists.org/fulldisclosure/2015/Nov/39 https://www.onapsis.com/blog/analyzing-sap-security-notes-september-2015 https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_HTTP_based • CWE-20: Improper Input Validation •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 0

SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to cause a denial of service (memory corruption and indexserver crash) via unspecified vectors to the EXECUTE_SEARCH_RULE_SET stored procedure, aka SAP Security Note 2175928. SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a usuarios remotos autenticados causar una denegación de servicio (consumo de memoria y caída de indexserver) a través de vectores no especificados en el procedimiento EXECUTE_SEARCH_RULE_SET almacenado, también conocida como SAP Security Note 2175928. • http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html http://scn.sap.com/community/security/blog/2015/08/18/sap-security-notes-august-2015 http://seclists.org/fulldisclosure/2015/Nov/38 http://www.onapsis.com/research/security-advisories/SAP_HANA_EXECUTE_SEARCH_RULE_SET_Stored_Procedure_Memory_corruption • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Web Dispatcher service in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to read web dispatcher and security trace files and possibly obtain passwords via unspecified vectors, aka SAP Security Note 2148854. el servicio Web Dispatcher en SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a atacantes remotos leer archivos web dispatcher y security trace y posiblemente obtener contraseñas a través de vectores no especificados, también conocida como SAP Security Note 2148854. • http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html http://seclists.org/fulldisclosure/2015/Nov/37 http://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Trace_Disclosure • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 0

SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583. SAP HANA Database 1.00 SPS10 y anteriores no requiere autenticación, lo que permite a atacantes remotos ejecutar código arbitrario o tener otro impacto no especificado a través de un paquete TrexNet al método (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop o (17) pythonexec, también conocida como SAP Security Note 2165583. • http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html http://seclists.org/fulldisclosure/2015/Nov/36 https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 38%CPEs: 1EXPL: 2

The index server (hdbindexserver) in SAP HANA 1.00.095 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTTP request, aka SAP Security Note 2197428. El servidor index (hdbindexserver) en SAP HANA 1.00.095 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de una petición HTTP, también conocida como SAP Security Note 2197428. • https://www.exploit-db.com/exploits/39382 http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review http://seclists.org/fulldisclosure/2016/Jan/94 http://www.securityfocus.com/archive/1/537376/100/0/threaded https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •