2 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 9EXPL: 0

The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable. • https://me.sap.com/notes/3344295 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •

CVSS: 10.0EPSS: 87%CPEs: 1EXPL: 2

Heap-based buffer overflow in the Message HTTP Server in SAP Message Server allows remote attackers to execute arbitrary code via a long string in the group parameter to /msgserver/html/group. Desbordamiento de búfer basado en pila en Message HTTP Server en SAP Message Server permite a atacantes remotos ejecutar código de su elección a través de cadenas largas en el parámetro group en /msgserver/html/group. • https://www.exploit-db.com/exploits/30265 http://marc.info/?l=bugtraq&m=118365794615827&w=2 http://osvdb.org/38096 http://secunia.com/advisories/25966 http://securitytracker.com/id?1018340 http://www.kb.cert.org/vuls/id/305657 http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-message-server-heap-overflow http://www.securityfocus.com/bid/24765 http://www.vupen.com/english/advisories/2007/2451 https://exchange.xforce.ibmcloud.com/vulnerabilities/35279 •