Page 2 of 8 results (0.005 seconds)

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the MobiLink Synchronization Server component in SAP SQL Anywhere 17 and possibly earlier allows remote authenticated users to cause a denial of service (resource consumption and process crash) by sending a crafted packet several times, aka SAP Security Note 2308778. El desbordamiento del búfer en el componente MobiLink Synchronization Server en SAP SQL Anywhere 17 y posiblemente anteriores permite que los usuarios autenticados remotos provoquen una denegación de servicio (consumo de recursos y fallo del proceso) enviando un paquete manipulado varias veces, también conocido como Nota de seguridad SAP 2308778. • http://www.securityfocus.com/bid/91197 https://erpscan.io/advisories/erpscan-16-024-sap-sql-anywhere-mobilink-synchronization-server-buffer-overflow • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

SAP Sybase SQL Anywhere 11 and 16 allows remote attackers to cause a denial of service (crash) via a crafted request, aka SAP Security Note 2108161. SAP Sybase SQL Anywhere 11 y 16 permite a atacantes remotos causar una denegación de servicio (caída) a través de una solicitud manipulada, también conocido como la mota de seguridad de SAP 2108161. • http://packetstormsecurity.com/files/132364/SYBASE-SQL-Anywhere-12-16-Denial-Of-Service.html http://seclists.org/fulldisclosure/2015/Jun/68 http://www.securityfocus.com/archive/1/535831/100/800/threaded http://www.securityfocus.com/bid/74317 https://erpscan.io/advisories/erpscan-15-010-sybase-sql-anywhere-11-and-16-dos • CWE-20: Improper Input Validation •

CVSS: 9.5EPSS: 93%CPEs: 1EXPL: 0

Stack-based buffer overflow in the .NET Data Provider in SAP SQL Anywhere allows remote attackers to execute arbitrary code via a crafted column alias. Desbordamiento de buffer basado en pila en .NET Data Provider en SAP SQL Anywhere permite a atacantes remotos ejecutar código arbitrario a través de un alias de columna manipulado. This allows attackers to execute arbitrary code on applications which pass user provided data to the vulnerable API in SAP SQL Anywhere. The specific flaw exists within the handling of a malformed integer constant. If an application allows untrusted input to be used in a query, even if the input is correctly filtered against SQL injection, an attacker could overflow a fixed size stack buffer and execute arbitrary code in the context of the application. • http://www.zerodayinitiative.com/advisories/ZDI-14-412 http://www.zerodayinitiative.com/advisories/ZDI-14-413 http://www.zerodayinitiative.com/advisories/ZDI-14-414 http://www.zerodayinitiative.com/advisories/ZDI-14-415 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •