Page 2 of 10 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory. Bajo ciertas condiciones, SAP HANA 1.00 y 2.00 permite que un atacante no autenticado acceda a información que, de otra forma, estaría restringida. Un atacante puede emplear erróneamente la función de autenticación del servidor de SAP HANA en su interfaz de SQL y revelar 8 bytes de la memoria del proceso del servidor. • http://www.securityfocus.com/bid/102997 https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018 https://launchpad.support.sap.com/#/notes/2572940 •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform's hostname. Un atacante remoto no autenticado en SAP HANA 1.00 y 2.00 podría enviar peticiones SOAP especialmente manipuladas a SAP Startup Service y revelar información como el nombre del host de la plataforma. • http://www.securityfocus.com/bid/102452 https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018 https://launchpad.support.sap.com/#/notes/2575750 •

CVSS: 8.1EPSS: 1%CPEs: 1EXPL: 0

The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as "False," which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869. La interfaz SQL en SAP HANA en versiones anteriores a Revision 102 no limita el número de intentos de inicio de sesión para el usuario SYSTEM cuando el password_lock_for_system_user no es apoyado o está configurado como "False," lo que facilita a atacantes remotos eludir la autenticación a través de un ataque de fuerza bruta, también conocido como SAP Security Note 2216869. • http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html http://seclists.org/fulldisclosure/2016/Aug/91 http://www.securityfocus.com/bid/92065 https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack • CWE-284: Improper Access Control •

CVSS: 7.5EPSS: 38%CPEs: 1EXPL: 2

The index server (hdbindexserver) in SAP HANA 1.00.095 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTTP request, aka SAP Security Note 2197428. El servidor index (hdbindexserver) en SAP HANA 1.00.095 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de una petición HTTP, también conocida como SAP Security Note 2197428. • https://www.exploit-db.com/exploits/39382 http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review http://seclists.org/fulldisclosure/2016/Jan/94 http://www.securityfocus.com/archive/1/537376/100/0/threaded https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in metadata.xsjs in SAP HANA 1.00.60.379371 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en metadata.xsjs en SAP HANA 1.00.60.379371 permite a atacantes remotos ejecutar comandos SQL arbitrarios a través de vectores no especificados. • https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014 https://exchange.xforce.ibmcloud.com/vulnerabilities/98579 https://service.sap.com/sap/support/notes/2067972 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •