
CVE-2018-2373
https://notcve.org/view.php?id=CVE-2018-2373
14 Feb 2018 — Under certain circumstances, a specific endpoint of the Controller's API could be misused by unauthenticated users to execute SQL statements that deliver information about system configuration in SAP HANA Extended Application Services, 1.0. Bajo ciertas circunstancias, un endpoint específico de la API del controlador podría ser empleado erróneamente por usuarios no autenticados para ejecutar instrucciones SQL que envían información sobre la configuración del sistema en SAP HANA Extended Application Services... • https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018 •

CVE-2018-2362
https://notcve.org/view.php?id=CVE-2018-2362
09 Jan 2018 — A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform's hostname. Un atacante remoto no autenticado en SAP HANA 1.00 y 2.00 podría enviar peticiones SOAP especialmente manipuladas a SAP Startup Service y revelar información como el nombre del host de la plataforma. • http://www.securityfocus.com/bid/102452 •

CVE-2017-16680
https://notcve.org/view.php?id=CVE-2017-16680
12 Dec 2017 — Two potential audit log injections in SAP HANA extended application services 1.0, advanced model: 1) Certain HTTP/REST endpoints of controller service are missing user input validation which could allow unprivileged attackers to forge audit log lines. Hence the interpretation of audit log files could be hindered or misdirected. 2) User Account and Authentication writes audit logs into syslog and additionally writes the same audit entries into a log file. Entries in the log file miss escaping. Hence the inte... • http://www.securityfocus.com/bid/102138 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVE-2016-6144 – SAP HANA DB 1.00.73.00.389160 SYSTEM User Brute Force
https://notcve.org/view.php?id=CVE-2016-6144
05 Aug 2016 — The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as "False," which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869. La interfaz SQL en SAP HANA en versiones anteriores a Revision 102 no limita el número de intentos de inicio de sesión para el usuario SYSTEM cuando el password_lock_for_system_user no es ... • http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html • CWE-284: Improper Access Control •

CVE-2015-7828 – SAP HANA TrexNet Command Execution
https://notcve.org/view.php?id=CVE-2015-7828
09 Nov 2015 — SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583. SAP HANA Database 1.00 SPS10 y anteriores no requiere autenticación, lo qu... • http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html • CWE-20: Improper Input Validation •

CVE-2015-7986 – SAP HANA 1.00.095 - hdbindexserver Memory Corruption
https://notcve.org/view.php?id=CVE-2015-7986
27 Oct 2015 — The index server (hdbindexserver) in SAP HANA 1.00.095 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTTP request, aka SAP Security Note 2197428. El servidor index (hdbindexserver) en SAP HANA 1.00.095 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de una petición HTTP, también conocida como SAP Security Note 2197428. • https://www.exploit-db.com/exploits/39382 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •