All the vulnerabilites related to sap - hana
cve-2016-6142
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Aug/89 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/92566 | vdb-entry, x_refsource_BID | |
http://onapsis.com/research/security-advisories/sap-hana-arbitrary-audit-injection-sql-protocol | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.566Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-025: SAP HANA arbitrary audit injection via SQL protocol", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/89" }, { "name": "92566", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92566" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://onapsis.com/research/security-advisories/sap-hana-arbitrary-audit-injection-sql-protocol" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to inject arbitrary audit trail fields into the SYSLOG via vectors related to the SQL protocol, aka SAP Security Note 2197459." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-09-26T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-025: SAP HANA arbitrary audit injection via SQL protocol", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/89" }, { "name": "92566", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92566" }, { "tags": [ "x_refsource_MISC" ], "url": "http://onapsis.com/research/security-advisories/sap-hana-arbitrary-audit-injection-sql-protocol" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to inject arbitrary audit trail fields into the SYSLOG via vectors related to the SQL protocol, aka SAP Security Note 2197459." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-025: SAP HANA arbitrary audit injection via SQL protocol", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/89" }, { "name": "92566", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92566" }, { "name": "http://onapsis.com/research/security-advisories/sap-hana-arbitrary-audit-injection-sql-protocol", "refsource": "MISC", "url": "http://onapsis.com/research/security-advisories/sap-hana-arbitrary-audit-injection-sql-protocol" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6142", "datePublished": "2016-09-26T16:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6144
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack | x_refsource_MISC | |
https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components | x_refsource_MISC | |
http://www.securityfocus.com/bid/92065 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2016/Aug/91 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.566Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components" }, { "name": "92065", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92065" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-026: SAP HANA SYSTEM user brute force attack", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/91" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as \"False,\" which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components" }, { "name": "92065", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92065" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-026: SAP HANA SYSTEM user brute force attack", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/91" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6144", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as \"False,\" which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack" }, { "name": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components", "refsource": "MISC", "url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components" }, { "name": "92065", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92065" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-026: SAP HANA SYSTEM user brute force attack", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/91" }, { "name": "http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6144", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7726
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.onapsis.com/research/security-advisories/sap-hana-xss-role-deletion-through-web-based-workbench | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Sep/114 | mailing-list, x_refsource_FULLDISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-role-deletion-through-web-based-workbench" }, { "name": "20150929 [Onapsis Security Advisory 2015-019] SAP HANA XSS in role deletion through Web-based development workbench", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/114" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in role deletion in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allows remote authenticated users to inject arbitrary web script or HTML via the role name, aka SAP Security Note 2153898." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-15T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-role-deletion-through-web-based-workbench" }, { "name": "20150929 [Onapsis Security Advisory 2015-019] SAP HANA XSS in role deletion through Web-based development workbench", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/114" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7726", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in role deletion in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allows remote authenticated users to inject arbitrary web script or HTML via the role name, aka SAP Security Note 2153898." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-role-deletion-through-web-based-workbench", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-role-deletion-through-web-based-workbench" }, { "name": "20150929 [Onapsis Security Advisory 2015-019] SAP HANA XSS in role deletion through Web-based development workbench", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/114" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7726", "datePublished": "2015-10-15T20:00:00", "dateReserved": "2015-10-06T00:00:00", "dateUpdated": "2024-08-06T07:58:59.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6150
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2016/Aug/96 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/92064 | vdb-entry, x_refsource_BID | |
https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html | x_refsource_MISC | |
https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-040: SAP HANA potential wrong encryption", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/96" }, { "name": "92064", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92064" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The multi-tenant database container feature in SAP HANA does not properly encrypt communications, which allows remote attackers to bypass intended access restrictions and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2233550." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-040: SAP HANA potential wrong encryption", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/96" }, { "name": "92064", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92064" }, { "tags": [ "x_refsource_MISC" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6150", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The multi-tenant database container feature in SAP HANA does not properly encrypt communications, which allows remote attackers to bypass intended access restrictions and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2233550." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-040: SAP HANA potential wrong encryption", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/96" }, { "name": "92064", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92064" }, { "name": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf", "refsource": "MISC", "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "name": "http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6150", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21484
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107 | x_refsource_MISC | |
https://launchpad.support.sap.com/#/notes/3017378 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3017378" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-09T14:11:24", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/3017378" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2021-21484", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "2.0" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind." } ] }, "impact": { "cvss": { "baseScore": "7.7", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" }, { "name": "https://launchpad.support.sap.com/#/notes/3017378", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/3017378" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2021-21484", "datePublished": "2021-03-09T14:11:24", "dateReserved": "2020-12-30T00:00:00", "dateUpdated": "2024-08-03T18:16:22.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6143
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/92062 | vdb-entry, x_refsource_BID | |
https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf | x_refsource_MISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "92062", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92062" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 allows remote attackers to execute arbitrary code via vectors involving the audit logs, aka SAP Security Note 2170806." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-13T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "92062", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92062" }, { "tags": [ "x_refsource_MISC" ], "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6143", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP HANA DB 1.00.73.00.389160 allows remote attackers to execute arbitrary code via vectors involving the audit logs, aka SAP Security Note 2170806." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "92062", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92062" }, { "name": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf", "refsource": "MISC", "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6143", "datePublished": "2017-04-13T14:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2749
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/92325 | vdb-entry, x_refsource_XF | |
http://www.onapsis.com/get.php?resid=adv_onapsis-2014-001 | x_refsource_MISC | |
http://www.securityfocus.com/bid/66675 | vdb-entry, x_refsource_BID | |
http://www.onapsis.com/research-advisories.php | x_refsource_MISC | |
http://secunia.com/advisories/57443 | third-party-advisory, x_refsource_SECUNIA | |
https://service.sap.com/sap/support/notes/1914778 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:21:36.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sap-hana-icm-info-disc(92325)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92325" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-001" }, { "name": "66675", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66675" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/research-advisories.php" }, { "name": "57443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57443" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.sap.com/sap/support/notes/1914778" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The HANA ICM process in SAP HANA allows remote attackers to obtain the platform version, host name, instance number, and possibly other sensitive information via a malformed HTTP GET request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sap-hana-icm-info-disc(92325)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92325" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-001" }, { "name": "66675", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66675" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/research-advisories.php" }, { "name": "57443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57443" }, { "tags": [ "x_refsource_MISC" ], "url": "https://service.sap.com/sap/support/notes/1914778" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2749", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HANA ICM process in SAP HANA allows remote attackers to obtain the platform version, host name, instance number, and possibly other sensitive information via a malformed HTTP GET request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sap-hana-icm-info-disc(92325)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92325" }, { "name": "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-001", "refsource": "MISC", "url": "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-001" }, { "name": "66675", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66675" }, { "name": "http://www.onapsis.com/research-advisories.php", "refsource": "MISC", "url": "http://www.onapsis.com/research-advisories.php" }, { "name": "57443", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57443" }, { "name": "https://service.sap.com/sap/support/notes/1914778", "refsource": "MISC", "url": "https://service.sap.com/sap/support/notes/1914778" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2749", "datePublished": "2014-04-10T15:00:00", "dateReserved": "2014-04-10T00:00:00", "dateUpdated": "2024-08-06T10:21:36.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2402
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103369 | vdb-entry, x_refsource_BID | |
https://launchpad.support.sap.com/#/notes/2587369 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:21:33.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/" }, { "name": "103369", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103369" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2587369" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "2.0" } ] } ], "datePublic": "2018-03-13T00:00:00", "descriptions": [ { "lang": "en", "value": "In systems using the optional capture \u0026 replay functionality of SAP HANA, 1.00 and 2.00, (see SAP Note 2362820 for more information about capture \u0026 replay), user credentials may be stored in clear text in the indexserver trace files of the control system. An attacker with the required authorizations on the control system may be able to access the user credentials and gain unauthorized access to data in the captured or target system." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/" }, { "name": "103369", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103369" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.support.sap.com/#/notes/2587369" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2402", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.0" }, { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In systems using the optional capture \u0026 replay functionality of SAP HANA, 1.00 and 2.00, (see SAP Note 2362820 for more information about capture \u0026 replay), user credentials may be stored in clear text in the indexserver trace files of the control system. An attacker with the required authorizations on the control system may be able to access the user credentials and gain unauthorized access to data in the captured or target system." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/", "refsource": "CONFIRM", "url": "https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/" }, { "name": "103369", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103369" }, { "name": "https://launchpad.support.sap.com/#/notes/2587369", "refsource": "CONFIRM", "url": "https://launchpad.support.sap.com/#/notes/2587369" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2402", "datePublished": "2018-03-14T19:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:21:33.207Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7994
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Nov/40 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html | x_refsource_MISC | |
https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_SQL_based | x_refsource_MISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20151109 [Onapsis Security Advisory 2015-044] SAP HANA Remote Code Execution (SQL Login based)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/40" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_SQL_based" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The SQL interface in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to \"SQL Login,\" aka SAP Security Note 2197428." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-10T16:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20151109 [Onapsis Security Advisory 2015-044] SAP HANA Remote Code Execution (SQL Login based)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/40" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_SQL_based" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SQL interface in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to \"SQL Login,\" aka SAP Security Note 2197428." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20151109 [Onapsis Security Advisory 2015-044] SAP HANA Remote Code Execution (SQL Login based)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/40" }, { "name": "http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html" }, { "name": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_SQL_based", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_SQL_based" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7994", "datePublished": "2015-11-10T16:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2465
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105324 | vdb-entry, x_refsource_BID | |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993 | x_refsource_CONFIRM | |
https://launchpad.support.sap.com/#/notes/2681207 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:21:33.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105324", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105324" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2681207" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA", "vendor": "SAP", "versions": [ { "status": "affected", "version": "= 1.0" }, { "status": "affected", "version": "= 2.0" } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP HANA (versions 1.0 and 2.0) Extended Application Services classic model OData parser does not sufficiently validate XML. By exploiting, an unauthorized hacker can cause the database server to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-13T09:57:01", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "name": "105324", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105324" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2681207" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2465", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA", "version": { "version_data": [ { "version_name": "=", "version_value": "1.0" }, { "version_name": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "SAP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP HANA (versions 1.0 and 2.0) Extended Application Services classic model OData parser does not sufficiently validate XML. By exploiting, an unauthorized hacker can cause the database server to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "105324", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105324" }, { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993", "refsource": "CONFIRM", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993" }, { "name": "https://launchpad.support.sap.com/#/notes/2681207", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2681207" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2465", "datePublished": "2018-09-11T15:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:21:33.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8313
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/533643/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/70293 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96879 | vdb-entry, x_refsource_XF | |
http://seclists.org/fulldisclosure/2014/Oct/36 | mailing-list, x_refsource_FULLDISC | |
http://scn.sap.com/docs/DOC-55451 | x_refsource_CONFIRM | |
https://service.sap.com/sap/support/notes/2015446 | x_refsource_CONFIRM | |
http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-028 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:51.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141008 [Onapsis Security Advisory 2014-028] SAP HANA Web-based Development Workbench Code Injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533643/100/0/threaded" }, { "name": "70293", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70293" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html" }, { "name": "sap-hana-directives-code-execution(96879)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96879" }, { "name": "20141008 [Onapsis Security Advisory 2014-028] SAP HANA Web-based Development Workbench Code Injection", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/36" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://scn.sap.com/docs/DOC-55451" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://service.sap.com/sap/support/notes/2015446" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Eval injection in ide/core/base/server/net.xsjs in the Developer Workbench in SAP HANA allows remote attackers to execute arbitrary XSJX code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20141008 [Onapsis Security Advisory 2014-028] SAP HANA Web-based Development Workbench Code Injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533643/100/0/threaded" }, { "name": "70293", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70293" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html" }, { "name": "sap-hana-directives-code-execution(96879)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96879" }, { "name": "20141008 [Onapsis Security Advisory 2014-028] SAP HANA Web-based Development Workbench Code Injection", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/36" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://scn.sap.com/docs/DOC-55451" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://service.sap.com/sap/support/notes/2015446" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-028" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8313", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eval injection in ide/core/base/server/net.xsjs in the Developer Workbench in SAP HANA allows remote attackers to execute arbitrary XSJX code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141008 [Onapsis Security Advisory 2014-028] SAP HANA Web-based Development Workbench Code Injection", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533643/100/0/threaded" }, { "name": "70293", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70293" }, { "name": "http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html" }, { "name": "sap-hana-directives-code-execution(96879)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96879" }, { "name": "20141008 [Onapsis Security Advisory 2014-028] SAP HANA Web-based Development Workbench Code Injection", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/36" }, { "name": "http://scn.sap.com/docs/DOC-55451", "refsource": "CONFIRM", "url": "http://scn.sap.com/docs/DOC-55451" }, { "name": "https://service.sap.com/sap/support/notes/2015446", "refsource": "CONFIRM", "url": "https://service.sap.com/sap/support/notes/2015446" }, { "name": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-028", "refsource": "MISC", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-028" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8313", "datePublished": "2014-10-16T19:00:00", "dateReserved": "2014-10-16T00:00:00", "dateUpdated": "2024-08-06T13:10:51.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7728
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Sep/116 | mailing-list, x_refsource_FULLDISC | |
https://www.onapsis.com/research/security-advisories/sap-hana-xss-user-creation-through-web-based-development | x_refsource_MISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150929 [Onapsis Security Advisory 2015-021] SAP HANA XSS in user creation through Web-based development workbench", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/116" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-user-creation-through-web-based-development" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in user creation in the Web-based Development Workbench in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to inject arbitrary web script or HTML via the username, aka SAP Security Note 2153898." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-15T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150929 [Onapsis Security Advisory 2015-021] SAP HANA XSS in user creation through Web-based development workbench", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/116" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-user-creation-through-web-based-development" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7728", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in user creation in the Web-based Development Workbench in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to inject arbitrary web script or HTML via the username, aka SAP Security Note 2153898." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150929 [Onapsis Security Advisory 2015-021] SAP HANA XSS in user creation through Web-based development workbench", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/116" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-user-creation-through-web-based-development", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-user-creation-through-web-based-development" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7728", "datePublished": "2015-10-15T20:00:00", "dateReserved": "2015-10-06T00:00:00", "dateUpdated": "2024-08-06T07:58:59.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8588
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/ | x_refsource_MISC | |
https://service.sap.com/sap/support/notes/2067972 | x_refsource_MISC | |
https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/ | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98579 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:25:59.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.sap.com/sap/support/notes/2067972" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/" }, { "name": "sap-hana-cve20148588-sql-injection(98579)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98579" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in metadata.xsjs in SAP HANA 1.00.60.379371 allows remote attackers to execute arbitrary SQL commands via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-10T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://service.sap.com/sap/support/notes/2067972" }, { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/" }, { "name": "sap-hana-cve20148588-sql-injection(98579)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98579" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8588", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in metadata.xsjs in SAP HANA 1.00.60.379371 allows remote attackers to execute arbitrary SQL commands via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/", "refsource": "MISC", "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "name": "https://service.sap.com/sap/support/notes/2067972", "refsource": "MISC", "url": "https://service.sap.com/sap/support/notes/2067972" }, { "name": "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/", "refsource": "MISC", "url": "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/" }, { "name": "sap-hana-cve20148588-sql-injection(98579)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98579" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8588", "datePublished": "2014-11-04T15:00:00", "dateReserved": "2014-11-04T00:00:00", "dateUpdated": "2024-08-06T13:25:59.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6148
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html | x_refsource_MISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016 | x_refsource_MISC | |
https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Aug/95 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/92067 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/95" }, { "name": "92067", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92067" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 allows remote attackers to cause a denial of service (process termination) or execute arbitrary code via vectors related to an IMPORT statement, aka SAP Security Note 2233136." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016" }, { "tags": [ "x_refsource_MISC" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/95" }, { "name": "92067", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92067" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP HANA DB 1.00.73.00.389160 allows remote attackers to cause a denial of service (process termination) or execute arbitrary code via vectors related to an IMPORT statement, aka SAP Security Note 2233136." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016" }, { "name": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf", "refsource": "MISC", "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-037: SAP HANA Potential Remote Code Execution", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/95" }, { "name": "92067", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92067" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6148", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2497
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699 | x_refsource_MISC | |
http://www.securityfocus.com/bid/106152 | vdb-entry, x_refsource_BID | |
https://launchpad.support.sap.com/#/notes/2704878 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:21:34.166Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699" }, { "name": "106152", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106152" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2704878" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA", "vendor": "SAP", "versions": [ { "status": "affected", "version": "= 1.0" }, { "status": "affected", "version": "= 2.0" } ] } ], "datePublic": "2018-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The security audit log of SAP HANA, versions 1.0 and 2.0, does not log SELECT events if these events are part of a statement with the syntax CREATE TABLE \u003ctable_name\u003e AS SELECT." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-12T10:57:01", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699" }, { "name": "106152", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106152" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2704878" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2497", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA", "version": { "version_data": [ { "version_name": "=", "version_value": "1.0" }, { "version_name": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "SAP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The security audit log of SAP HANA, versions 1.0 and 2.0, does not log SELECT events if these events are part of a statement with the syntax CREATE TABLE \u003ctable_name\u003e AS SELECT." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699" }, { "name": "106152", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106152" }, { "name": "https://launchpad.support.sap.com/#/notes/2704878", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2704878" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2497", "datePublished": "2018-12-11T23:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:21:34.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7986
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review | x_refsource_MISC | |
https://www.exploit-db.com/exploits/39382/ | exploit, x_refsource_EXPLOIT-DB | |
http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/537376/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/ | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Jan/94 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "name": "39382", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/39382/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html" }, { "name": "20160127 [ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537376/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/" }, { "name": "20160127 [ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/94" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The index server (hdbindexserver) in SAP HANA 1.00.095 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTTP request, aka SAP Security Note 2197428." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-10T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "name": "39382", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/39382/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html" }, { "name": "20160127 [ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/537376/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/" }, { "name": "20160127 [ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Jan/94" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The index server (hdbindexserver) in SAP HANA 1.00.095 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTTP request, aka SAP Security Note 2197428." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review", "refsource": "MISC", "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "name": "39382", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/39382/" }, { "name": "http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html" }, { "name": "20160127 [ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537376/100/0/threaded" }, { "name": "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/", "refsource": "MISC", "url": "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/" }, { "name": "20160127 [ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Jan/94" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7986", "datePublished": "2015-10-27T16:00:00", "dateReserved": "2015-10-27T00:00:00", "dateUpdated": "2024-08-06T08:06:31.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0284
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114 | x_refsource_CONFIRM | |
https://launchpad.support.sap.com/#/notes/2772376 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:16.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2772376" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 1.0" }, { "status": "affected", "version": "\u003c 2.0" } ] } ], "datePublic": "2019-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SLD Registration in SAP HANA (fixed in versions 1.0, 2.0) does not sufficiently validate an XML document accepted from an untrusted source. The attacker can call SLDREG with an XML file containing a reference to an XML External Entity (XXE). This can cause SLDREG to, for example, continuously loop, read arbitrary files and even send local files." } ], "problemTypes": [ { "descriptions": [ { "description": "XML External Entity", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-10T20:25:40", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.support.sap.com/#/notes/2772376" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2019-0284", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "1.0" }, { "version_name": "\u003c", "version_value": "2.0" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SLD Registration in SAP HANA (fixed in versions 1.0, 2.0) does not sufficiently validate an XML document accepted from an untrusted source. The attacker can call SLDREG with an XML file containing a reference to an XML External Entity (XXE). This can cause SLDREG to, for example, continuously loop, read arbitrary files and even send local files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XML External Entity" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114", "refsource": "CONFIRM", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114" }, { "name": "https://launchpad.support.sap.com/#/notes/2772376", "refsource": "CONFIRM", "url": "https://launchpad.support.sap.com/#/notes/2772376" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2019-0284", "datePublished": "2019-04-10T20:25:40", "dateReserved": "2018-11-26T00:00:00", "dateUpdated": "2024-08-04T17:44:16.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7828
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2015/Nov/36 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html | x_refsource_MISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:59:00.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20151109 [Onapsis Security Advisory 2015-024-040] SAP HANA TrexNet Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/36" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-10T16:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20151109 [Onapsis Security Advisory 2015-024-040] SAP HANA TrexNet Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/36" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7828", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20151109 [Onapsis Security Advisory 2015-024-040] SAP HANA TrexNet Vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/36" }, { "name": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7828", "datePublished": "2015-11-10T16:00:00", "dateReserved": "2015-10-14T00:00:00", "dateUpdated": "2024-08-06T07:59:00.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4017
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:17:30.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The Data Provisioning Agent (aka DP Agent) in SAP HANA allows remote attackers to cause a denial of service (process crash) via unspecified vectors, aka SAP Security Note 2262710." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-10T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-4017", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Data Provisioning Agent (aka DP Agent) in SAP HANA allows remote attackers to cause a denial of service (process crash) via unspecified vectors, aka SAP Security Note 2262710." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", "refsource": "MISC", "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-4017", "datePublished": "2016-04-14T14:00:00", "dateReserved": "2016-04-14T00:00:00", "dateUpdated": "2024-08-06T00:17:30.806Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6507
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Sep/109 | mailing-list, x_refsource_FULLDISC | |
https://www.onapsis.com/research/security-advisories/sap-hana-multiple-memory-corruption-vulnerabilities | x_refsource_MISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:22:22.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-009] SAP HANA hdbsql Multiple Memory Corruption Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/109" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-multiple-memory-corruption-vulnerabilities" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The hdbsql client 1.00.091.00 Build 1418659308-1530 in SAP HANA allows local users to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2140700." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-15T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-009] SAP HANA hdbsql Multiple Memory Corruption Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/109" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-multiple-memory-corruption-vulnerabilities" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6507", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The hdbsql client 1.00.091.00 Build 1418659308-1530 in SAP HANA allows local users to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2140700." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-009] SAP HANA hdbsql Multiple Memory Corruption Vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/109" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-multiple-memory-corruption-vulnerabilities", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-multiple-memory-corruption-vulnerabilities" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6507", "datePublished": "2015-10-15T20:00:00", "dateReserved": "2015-08-18T00:00:00", "dateUpdated": "2024-08-06T07:22:22.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8587
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://service.sap.com/sap/support/notes/2067859 | x_refsource_CONFIRM | |
http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/ | x_refsource_MISC | |
https://twitter.com/SAP_Gsupport/status/522401681997570048 | x_refsource_CONFIRM | |
http://secunia.com/advisories/57606 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:25:59.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://service.sap.com/sap/support/notes/2067859" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://twitter.com/SAP_Gsupport/status/522401681997570048" }, { "name": "57606", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57606" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-04T15:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://service.sap.com/sap/support/notes/2067859" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://twitter.com/SAP_Gsupport/status/522401681997570048" }, { "name": "57606", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57606" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8587", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://service.sap.com/sap/support/notes/2067859", "refsource": "CONFIRM", "url": "http://service.sap.com/sap/support/notes/2067859" }, { "name": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/", "refsource": "MISC", "url": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/" }, { "name": "https://twitter.com/SAP_Gsupport/status/522401681997570048", "refsource": "CONFIRM", "url": "https://twitter.com/SAP_Gsupport/status/522401681997570048" }, { "name": "57606", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57606" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8587", "datePublished": "2014-11-04T15:00:00Z", "dateReserved": "2014-11-04T00:00:00Z", "dateUpdated": "2024-09-16T20:17:25.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3994
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/535618/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services | x_refsource_MISC | |
http://www.securityfocus.com/bid/74859 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/May/118 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:04:02.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150527 [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535618/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services" }, { "name": "74859", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74859" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html" }, { "name": "20150527 [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/May/118" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The grant.xsfunc application in testApps/grantAccess/ in the XS Engine in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to spoof log entries via a crafted request, aka SAP Security Note 2109818." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150527 [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535618/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services" }, { "name": "74859", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74859" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html" }, { "name": "20150527 [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/May/118" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The grant.xsfunc application in testApps/grantAccess/ in the XS Engine in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to spoof log entries via a crafted request, aka SAP Security Note 2109818." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150527 [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535618/100/0/threaded" }, { "name": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services", "refsource": "MISC", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services" }, { "name": "74859", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74859" }, { "name": "http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html" }, { "name": "20150527 [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/May/118" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3994", "datePublished": "2015-05-29T15:00:00", "dateReserved": "2015-05-15T00:00:00", "dateUpdated": "2024-08-06T06:04:02.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-3995
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/535619/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/74861 | vdb-entry, x_refsource_BID | |
http://www.onapsis.com/research/security-advisories/SAP-HANA-Information-Disclosure-via-SQL-IMPORT-FROM-statement | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/May/119 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:04:01.786Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20150527 [Onapsis Security Advisory 2015-006] SAP HANA Information Disclosure via SQL IMPORT FROM statement", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535619/100/0/threaded" }, { "name": "74861", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74861" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Information-Disclosure-via-SQL-IMPORT-FROM-statement" }, { "name": "20150527 [Onapsis Security Advisory 2015-006] SAP HANA Information Disclosure via SQL IMPORT FROM statement", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/May/119" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to read arbitrary files via an IMPORT FROM SQL statement, aka SAP Security Note 2109565." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20150527 [Onapsis Security Advisory 2015-006] SAP HANA Information Disclosure via SQL IMPORT FROM statement", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535619/100/0/threaded" }, { "name": "74861", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74861" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Information-Disclosure-via-SQL-IMPORT-FROM-statement" }, { "name": "20150527 [Onapsis Security Advisory 2015-006] SAP HANA Information Disclosure via SQL IMPORT FROM statement", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/May/119" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-3995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to read arbitrary files via an IMPORT FROM SQL statement, aka SAP Security Note 2109565." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20150527 [Onapsis Security Advisory 2015-006] SAP HANA Information Disclosure via SQL IMPORT FROM statement", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535619/100/0/threaded" }, { "name": "74861", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74861" }, { "name": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Information-Disclosure-via-SQL-IMPORT-FROM-statement", "refsource": "MISC", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Information-Disclosure-via-SQL-IMPORT-FROM-statement" }, { "name": "20150527 [Onapsis Security Advisory 2015-006] SAP HANA Information Disclosure via SQL IMPORT FROM statement", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/May/119" }, { "name": "http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-3995", "datePublished": "2015-05-29T15:00:00", "dateReserved": "2015-05-15T00:00:00", "dateUpdated": "2024-08-06T06:04:01.786Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7729
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.onapsis.com/research/security-advisories/sap-hana-xsjs-code-injection-test-net | x_refsource_MISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition | x_refsource_MISC | |
http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Sep/112 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xsjs-code-injection-test-net" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-017] SAP HANA XSJS Code Injection in test-net.xsjs", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/112" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Eval injection in test-net.xsjs in the Web-based Development Workbench in SAP HANA Developer Edition DB 1.00.091.00.1418659308 allows remote authenticated users to execute arbitrary XSJS code via unspecified vectors, aka SAP Security Note 2153892." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-15T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xsjs-code-injection-test-net" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-017] SAP HANA XSJS Code Injection in test-net.xsjs", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/112" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7729", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eval injection in test-net.xsjs in the Web-based Development Workbench in SAP HANA Developer Edition DB 1.00.091.00.1418659308 allows remote authenticated users to execute arbitrary XSJS code via unspecified vectors, aka SAP Security Note 2153892." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-xsjs-code-injection-test-net", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xsjs-code-injection-test-net" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "name": "http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-017] SAP HANA XSJS Code Injection in test-net.xsjs", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/112" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7729", "datePublished": "2015-10-15T20:00:00", "dateReserved": "2015-10-06T00:00:00", "dateUpdated": "2024-08-06T07:58:59.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Nov/39 | mailing-list, x_refsource_FULLDISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-september-2015 | x_refsource_MISC | |
https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_HTTP_based | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html" }, { "name": "20151109 [Onapsis Security Advisory 2015-043] SAP HANA Remote Code Execution (HTTP Login based)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/39" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-september-2015" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_HTTP_based" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The Extended Application Services (aka XS or XS Engine) in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to \"HTTP Login,\" aka SAP Security Note 2197397." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-10T16:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html" }, { "name": "20151109 [Onapsis Security Advisory 2015-043] SAP HANA Remote Code Execution (HTTP Login based)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/39" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-september-2015" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_HTTP_based" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Extended Application Services (aka XS or XS Engine) in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to \"HTTP Login,\" aka SAP Security Note 2197397." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html" }, { "name": "20151109 [Onapsis Security Advisory 2015-043] SAP HANA Remote Code Execution (HTTP Login based)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/39" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-september-2015", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-september-2015" }, { "name": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_HTTP_based", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_HTTP_based" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7993", "datePublished": "2015-11-10T16:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1928
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/ | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Apr/65 | mailing-list, x_refsource_FULLDISC | |
https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/ | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/538212/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:10:40.238Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/" }, { "name": "20160420 [ERPSCAN-16-005] SAP HANA hdbxsengine JSON - DoS vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Apr/65" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "name": "20160427 Re: [ERPSCAN-16-005] SAP HANA hdbxsengine JSON - DoS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538212/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the XS engine (hdbxsengine) in SAP HANA allows remote attackers to cause a denial of service or execute arbitrary code via a crafted HTTP request, related to JSON, aka SAP Security Note 2241978." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-10T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/" }, { "name": "20160420 [ERPSCAN-16-005] SAP HANA hdbxsengine JSON - DoS vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Apr/65" }, { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "name": "20160427 Re: [ERPSCAN-16-005] SAP HANA hdbxsengine JSON - DoS vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538212/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-1928", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the XS engine (hdbxsengine) in SAP HANA allows remote attackers to cause a denial of service or execute arbitrary code via a crafted HTTP request, related to JSON, aka SAP Security Note 2241978." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/", "refsource": "MISC", "url": "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/" }, { "name": "20160420 [ERPSCAN-16-005] SAP HANA hdbxsengine JSON - DoS vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Apr/65" }, { "name": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/", "refsource": "MISC", "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "name": "20160427 Re: [ERPSCAN-16-005] SAP HANA hdbxsengine JSON - DoS vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538212/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1928", "datePublished": "2016-01-20T16:00:00", "dateReserved": "2016-01-20T00:00:00", "dateUpdated": "2024-08-05T23:10:40.238Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8314
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2014/Oct/37 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/533644/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://service.sap.com/sap/support/notes/2009696 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/70307 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html | x_refsource_MISC | |
http://scn.sap.com/docs/DOC-55451 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96878 | vdb-entry, x_refsource_XF | |
http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-027 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:51.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141008 [Onapsis Security Advisory 2014-027] SAP HANA Multiple Reflected Cross Site Scripting Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/37" }, { "name": "20141008 [Onapsis Security Advisory 2014-027] SAP HANA Multiple Reflected Cross Site Scripting Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533644/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://service.sap.com/sap/support/notes/2009696" }, { "name": "70307", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70307" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://scn.sap.com/docs/DOC-55451" }, { "name": "sap-hana--multiple-xss(96878)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96878" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA Developer Edition Revision 70 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) epm/admin/DataGen.xsjs or (2) epm/services/multiply.xsjs in the democontent." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20141008 [Onapsis Security Advisory 2014-027] SAP HANA Multiple Reflected Cross Site Scripting Vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/37" }, { "name": "20141008 [Onapsis Security Advisory 2014-027] SAP HANA Multiple Reflected Cross Site Scripting Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533644/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://service.sap.com/sap/support/notes/2009696" }, { "name": "70307", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70307" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://scn.sap.com/docs/DOC-55451" }, { "name": "sap-hana--multiple-xss(96878)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96878" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-027" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8314", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA Developer Edition Revision 70 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) epm/admin/DataGen.xsjs or (2) epm/services/multiply.xsjs in the democontent." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141008 [Onapsis Security Advisory 2014-027] SAP HANA Multiple Reflected Cross Site Scripting Vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/37" }, { "name": "20141008 [Onapsis Security Advisory 2014-027] SAP HANA Multiple Reflected Cross Site Scripting Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533644/100/0/threaded" }, { "name": "https://service.sap.com/sap/support/notes/2009696", "refsource": "CONFIRM", "url": "https://service.sap.com/sap/support/notes/2009696" }, { "name": "70307", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70307" }, { "name": "http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html" }, { "name": "http://scn.sap.com/docs/DOC-55451", "refsource": "CONFIRM", "url": "http://scn.sap.com/docs/DOC-55451" }, { "name": "sap-hana--multiple-xss(96878)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96878" }, { "name": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-027", "refsource": "MISC", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-027" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8314", "datePublished": "2014-10-16T19:00:00", "dateReserved": "2014-10-16T00:00:00", "dateUpdated": "2024-08-06T13:10:51.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2362
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/ | x_refsource_CONFIRM | |
https://launchpad.support.sap.com/#/notes/2575750 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/102452 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:14:39.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2575750" }, { "name": "102452", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102452" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "1.00" }, { "status": "affected", "version": "2.00" } ] } ], "datePublic": "2018-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform\u0027s hostname." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-11T10:57:01", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.support.sap.com/#/notes/2575750" }, { "name": "102452", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102452" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2362", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.00" }, { "version_affected": "=", "version_value": "2.00" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform\u0027s hostname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/", "refsource": "CONFIRM", "url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/" }, { "name": "https://launchpad.support.sap.com/#/notes/2575750", "refsource": "CONFIRM", "url": "https://launchpad.support.sap.com/#/notes/2575750" }, { "name": "102452", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102452" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2362", "datePublished": "2018-01-09T15:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:14:39.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7991
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html | x_refsource_MISC | |
http://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Trace_Disclosure | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Nov/37 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Trace_Disclosure" }, { "name": "20151109 [Onapsis Security Advisory 2015-041] SAP HANA Remote Trace Disclosure", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/37" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The Web Dispatcher service in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to read web dispatcher and security trace files and possibly obtain passwords via unspecified vectors, aka SAP Security Note 2148854." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-10T16:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Trace_Disclosure" }, { "name": "20151109 [Onapsis Security Advisory 2015-041] SAP HANA Remote Trace Disclosure", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/37" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Web Dispatcher service in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to read web dispatcher and security trace files and possibly obtain passwords via unspecified vectors, aka SAP Security Note 2148854." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html" }, { "name": "http://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Trace_Disclosure", "refsource": "MISC", "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Trace_Disclosure" }, { "name": "20151109 [Onapsis Security Advisory 2015-041] SAP HANA Remote Trace Disclosure", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/37" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7991", "datePublished": "2015-11-10T16:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4018
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:17:29.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The Data Provisioning Agent (aka DP Agent) in SAP HANA does not properly restrict access to service functionality, which allows remote attackers to obtain sensitive information, gain privileges, and conduct unspecified other attacks via unspecified vectors, aka SAP Security Note 2262742." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-10T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-4018", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Data Provisioning Agent (aka DP Agent) in SAP HANA does not properly restrict access to service functionality, which allows remote attackers to obtain sensitive information, gain privileges, and conduct unspecified other attacks via unspecified vectors, aka SAP Security Note 2262742." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/", "refsource": "MISC", "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-4018", "datePublished": "2016-04-14T14:00:00", "dateReserved": "2016-04-14T00:00:00", "dateUpdated": "2024-08-06T00:17:29.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7725
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-modifyuser" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-drop-credentials-sql-injection" }, { "name": "20150929 [Onapsis Security Advisory 2015-023] SAP HANA Drop Credentials SQL injection", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/118" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-016] SAP HANA SQL injection in _newUser function", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/111" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-newuser" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-sql-injection-settracelevelsforxsapps" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-015] SAP HANA SQL injection in _modifyUser function", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/110" }, { "name": "20150929 [Onapsis Security Advisory 2015-018] SAP HANA SQL injection in, setTraceLevelsForXsApps function", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allow remote authenticated users to execute arbitrary SQL commands via the (1) remoteSourceName in the dropCredentials function or unspecified vectors in the (2) setTraceLevelsForXsApps, (3) _modifyUser, or (4) _newUser function, aka SAP Security Notes 2153898 and 2153765." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-15T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-modifyuser" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-drop-credentials-sql-injection" }, { "name": "20150929 [Onapsis Security Advisory 2015-023] SAP HANA Drop Credentials SQL injection", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/118" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-016] SAP HANA SQL injection in _newUser function", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/111" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-newuser" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-sql-injection-settracelevelsforxsapps" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-015] SAP HANA SQL injection in _modifyUser function", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/110" }, { "name": "20150929 [Onapsis Security Advisory 2015-018] SAP HANA SQL injection in, setTraceLevelsForXsApps function", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7725", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allow remote authenticated users to execute arbitrary SQL commands via the (1) remoteSourceName in the dropCredentials function or unspecified vectors in the (2) setTraceLevelsForXsApps, (3) _modifyUser, or (4) _newUser function, aka SAP Security Notes 2153898 and 2153765." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-modifyuser", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-modifyuser" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-drop-credentials-sql-injection", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-drop-credentials-sql-injection" }, { "name": "20150929 [Onapsis Security Advisory 2015-023] SAP HANA Drop Credentials SQL injection", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/118" }, { "name": "http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-016] SAP HANA SQL injection in _newUser function", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/111" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-newuser", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-newuser" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "name": "http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-sql-injection-settracelevelsforxsapps", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-sql-injection-settracelevelsforxsapps" }, { "name": "http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html" }, { "name": "20150929 [Onapsis Security Advisory 2015-015] SAP HANA SQL injection in _modifyUser function", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/110" }, { "name": "20150929 [Onapsis Security Advisory 2015-018] SAP HANA SQL injection in, setTraceLevelsForXsApps function", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/113" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7725", "datePublished": "2015-10-15T20:00:00", "dateReserved": "2015-10-06T00:00:00", "dateUpdated": "2024-08-06T07:58:59.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2369
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/102997 | vdb-entry, x_refsource_BID | |
https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | x_refsource_CONFIRM | |
https://launchpad.support.sap.com/#/notes/2572940 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:14:39.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102997", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102997" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2572940" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "1.00" }, { "status": "affected", "version": "2.00" } ] } ], "datePublic": "2018-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-15T10:57:01", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "name": "102997", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102997" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.support.sap.com/#/notes/2572940" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2369", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.00" }, { "version_affected": "=", "version_value": "2.00" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "102997", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102997" }, { "name": "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/", "refsource": "CONFIRM", "url": "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/" }, { "name": "https://launchpad.support.sap.com/#/notes/2572940", "refsource": "CONFIRM", "url": "https://launchpad.support.sap.com/#/notes/2572940" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2369", "datePublished": "2018-02-14T12:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:14:39.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7992
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html | x_refsource_MISC | |
http://www.onapsis.com/research/security-advisories/SAP_HANA_EXECUTE_SEARCH_RULE_SET_Stored_Procedure_Memory_corruption | x_refsource_MISC | |
http://scn.sap.com/community/security/blog/2015/08/18/sap-security-notes-august-2015 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Nov/38 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_EXECUTE_SEARCH_RULE_SET_Stored_Procedure_Memory_corruption" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://scn.sap.com/community/security/blog/2015/08/18/sap-security-notes-august-2015" }, { "name": "20151109 [Onapsis Security Advisory 2015-042] SAP HANA EXECUTE_SEARCH_RULE_SET Stored Procedure Memory corruption", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/38" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to cause a denial of service (memory corruption and indexserver crash) via unspecified vectors to the EXECUTE_SEARCH_RULE_SET stored procedure, aka SAP Security Note 2175928." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-10T16:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_EXECUTE_SEARCH_RULE_SET_Stored_Procedure_Memory_corruption" }, { "tags": [ "x_refsource_MISC" ], "url": "http://scn.sap.com/community/security/blog/2015/08/18/sap-security-notes-august-2015" }, { "name": "20151109 [Onapsis Security Advisory 2015-042] SAP HANA EXECUTE_SEARCH_RULE_SET Stored Procedure Memory corruption", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Nov/38" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to cause a denial of service (memory corruption and indexserver crash) via unspecified vectors to the EXECUTE_SEARCH_RULE_SET stored procedure, aka SAP Security Note 2175928." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html" }, { "name": "http://www.onapsis.com/research/security-advisories/SAP_HANA_EXECUTE_SEARCH_RULE_SET_Stored_Procedure_Memory_corruption", "refsource": "MISC", "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_EXECUTE_SEARCH_RULE_SET_Stored_Procedure_Memory_corruption" }, { "name": "http://scn.sap.com/community/security/blog/2015/08/18/sap-security-notes-august-2015", "refsource": "MISC", "url": "http://scn.sap.com/community/security/blog/2015/08/18/sap-security-notes-august-2015" }, { "name": "20151109 [Onapsis Security Advisory 2015-042] SAP HANA EXECUTE_SEARCH_RULE_SET Stored Procedure Memory corruption", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/38" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7992", "datePublished": "2015-11-10T16:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-5172
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2014/Jul/153 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/68952 | vdb-entry, x_refsource_BID | |
https://service.sap.com/sap/support/notes/1993349 | x_refsource_CONFIRM | |
http://secunia.com/advisories/59634 | third-party-advisory, x_refsource_SECUNIA | |
http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/532941/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://scn.sap.com/docs/DOC-8218 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94922 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:34:37.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140729 [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Jul/153" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html" }, { "name": "68952", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/68952" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://service.sap.com/sap/support/notes/1993349" }, { "name": "59634", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59634" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025" }, { "name": "20140729 [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/532941/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://scn.sap.com/docs/DOC-8218" }, { "name": "sap-hanaxs-xss(94922)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94922" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the XS Administration Tools in SAP HANA allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140729 [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Jul/153" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html" }, { "name": "68952", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/68952" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://service.sap.com/sap/support/notes/1993349" }, { "name": "59634", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59634" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025" }, { "name": "20140729 [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/532941/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://scn.sap.com/docs/DOC-8218" }, { "name": "sap-hanaxs-xss(94922)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94922" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5172", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the XS Administration Tools in SAP HANA allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140729 [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Jul/153" }, { "name": "http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html" }, { "name": "68952", "refsource": "BID", "url": "http://www.securityfocus.com/bid/68952" }, { "name": "https://service.sap.com/sap/support/notes/1993349", "refsource": "CONFIRM", "url": "https://service.sap.com/sap/support/notes/1993349" }, { "name": "59634", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59634" }, { "name": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025", "refsource": "MISC", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025" }, { "name": "20140729 [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/532941/100/0/threaded" }, { "name": "http://scn.sap.com/docs/DOC-8218", "refsource": "CONFIRM", "url": "http://scn.sap.com/docs/DOC-8218" }, { "name": "sap-hanaxs-xss(94922)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94922" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5172", "datePublished": "2014-07-31T14:00:00", "dateReserved": "2014-07-31T00:00:00", "dateUpdated": "2024-08-06T11:34:37.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-1929
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/ | x_refsource_MISC | |
https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/ | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Apr/59 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:10:40.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "name": "20160415 [ERPSCAN-16-002] SAP HANA - log injection and no size restriction", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Apr/59" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The XS engine in SAP HANA allows remote attackers to spoof log entries in trace files and consequently cause a denial of service (disk consumption and process crash) via a crafted HTTP request, related to an unspecified debug function, aka SAP Security Note 2241978." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-10T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "name": "20160415 [ERPSCAN-16-002] SAP HANA - log injection and no size restriction", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Apr/59" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-1929", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XS engine in SAP HANA allows remote attackers to spoof log entries in trace files and consequently cause a denial of service (disk consumption and process crash) via a crafted HTTP request, related to an unspecified debug function, aka SAP Security Note 2241978." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/", "refsource": "MISC", "url": "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/" }, { "name": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/", "refsource": "MISC", "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "name": "20160415 [ERPSCAN-16-002] SAP HANA - log injection and no size restriction", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Apr/59" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-1929", "datePublished": "2016-01-20T16:00:00", "dateReserved": "2016-01-20T00:00:00", "dateUpdated": "2024-08-05T23:10:40.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0357
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 | x_refsource_CONFIRM | |
https://launchpad.support.sap.com/#/notes/2829681 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:16.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2829681" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 1.0" }, { "status": "affected", "version": "\u003c 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The administrator of SAP HANA database, before versions 1.0 and 2.0, can misuse HANA to execute commands with operating system \"root\" privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Authorization Check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-10T16:48:14", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2829681" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2019-0357", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "1.0" }, { "version_name": "\u003c", "version_value": "2.0" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administrator of SAP HANA database, before versions 1.0 and 2.0, can misuse HANA to execute commands with operating system \"root\" privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Authorization Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506", "refsource": "CONFIRM", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506" }, { "name": "https://launchpad.support.sap.com/#/notes/2829681", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2829681" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2019-0357", "datePublished": "2019-09-10T16:48:14", "dateReserved": "2018-11-26T00:00:00", "dateUpdated": "2024-08-04T17:44:16.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-7727
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html | x_refsource_MISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Sep/117 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html | x_refsource_MISC | |
http://www.onapsis.com/research/security-advisories/SAP-HANA-Trace-configuration-SQL-injection | x_refsource_MISC | |
https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-getsqltraceconfiguration-function | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2015/Sep/115 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "name": "20150929 [Onapsis Security Advisory 2015-022] SAP HANA SQL injection in getSqlTraceConfiguration function", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/117" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Trace-configuration-SQL-injection" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-getsqltraceconfiguration-function" }, { "name": "20150929 [Onapsis Security Advisory 2015-020] SAP HANA Trace configuration SQL injection", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/115" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-09-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors in the (1) trace configuration page or (2) getSqlTraceConfiguration function, aka SAP Security Note 2153898." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-10-15T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "name": "20150929 [Onapsis Security Advisory 2015-022] SAP HANA SQL injection in getSqlTraceConfiguration function", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/117" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Trace-configuration-SQL-injection" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-getsqltraceconfiguration-function" }, { "name": "20150929 [Onapsis Security Advisory 2015-020] SAP HANA Trace configuration SQL injection", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Sep/115" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7727", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors in the (1) trace configuration page or (2) getSqlTraceConfiguration function, aka SAP Security Note 2153898." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "name": "20150929 [Onapsis Security Advisory 2015-022] SAP HANA SQL injection in getSqlTraceConfiguration function", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/117" }, { "name": "http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html" }, { "name": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Trace-configuration-SQL-injection", "refsource": "MISC", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Trace-configuration-SQL-injection" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-getsqltraceconfiguration-function", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-getsqltraceconfiguration-function" }, { "name": "20150929 [Onapsis Security Advisory 2015-020] SAP HANA Trace configuration SQL injection", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Sep/115" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7727", "datePublished": "2015-10-15T20:00:00", "dateReserved": "2015-10-06T00:00:00", "dateUpdated": "2024-08-06T07:58:59.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2072
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/534747/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://seclists.org/fulldisclosure/2015/Feb/91 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/72773 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:02:43.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html" }, { "name": "20150225 [Onapsis Security Advisory 2015-001] Multiple Reflected Cross Site Scripting Vulnerabilities in SAP HANA Web-based Development Workbench", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534747/100/0/threaded" }, { "name": "20150225 [Onapsis Security Advisory 2015-001] Multiple Reflected Cross Site Scripting Vulnerabilities in SAP HANA Web-based Development Workbench", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Feb/91" }, { "name": "72773", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72773" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA 73 (1.00.73.00.389160) and HANA Developer Edition 80 (1.00.80.00.391861) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) ide/core/plugins/editor/templates/trace/hanaTraceDetailService.xsjs or (2) xs/ide/editor/templates/trace/hanaTraceDetailService.xsjs, aka SAP Note 2069676." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html" }, { "name": "20150225 [Onapsis Security Advisory 2015-001] Multiple Reflected Cross Site Scripting Vulnerabilities in SAP HANA Web-based Development Workbench", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534747/100/0/threaded" }, { "name": "20150225 [Onapsis Security Advisory 2015-001] Multiple Reflected Cross Site Scripting Vulnerabilities in SAP HANA Web-based Development Workbench", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Feb/91" }, { "name": "72773", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72773" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2072", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA 73 (1.00.73.00.389160) and HANA Developer Edition 80 (1.00.80.00.391861) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) ide/core/plugins/editor/templates/trace/hanaTraceDetailService.xsjs or (2) xs/ide/editor/templates/trace/hanaTraceDetailService.xsjs, aka SAP Note 2069676." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html" }, { "name": "20150225 [Onapsis Security Advisory 2015-001] Multiple Reflected Cross Site Scripting Vulnerabilities in SAP HANA Web-based Development Workbench", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534747/100/0/threaded" }, { "name": "20150225 [Onapsis Security Advisory 2015-001] Multiple Reflected Cross Site Scripting Vulnerabilities in SAP HANA Web-based Development Workbench", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Feb/91" }, { "name": "72773", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72773" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2072", "datePublished": "2015-02-27T15:00:00", "dateReserved": "2015-02-24T00:00:00", "dateUpdated": "2024-08-06T05:02:43.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.091.00:*:*:*:*:*:*:*", "matchCriteriaId": "01F631DA-2C5D-4EE4-AB22-8B576322223F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in role deletion in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allows remote authenticated users to inject arbitrary web script or HTML via the role name, aka SAP Security Note 2153898." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la eliminaci\u00f3n de rol en el Web-based Development Workbench en SAP HANA DB 1.00.091.00.1418659308 permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del nombre de rol, tambi\u00e9n conocida como SAP Security Note 2153898." } ], "id": "CVE-2015-7726", "lastModified": "2024-11-21T02:37:17.913", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-10-15T20:59:03.927", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/114" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-role-deletion-through-web-based-workbench" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-role-deletion-through-web-based-workbench" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The multi-tenant database container feature in SAP HANA does not properly encrypt communications, which allows remote attackers to bypass intended access restrictions and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2233550." }, { "lang": "es", "value": "La caracter\u00edstica del contenedor de base de datos de m\u00faltiples usuarios en SAP HANA no encripta adecuadamente las comunicaciones, lo que permite a atacantes remotos eludir las restricciones destinadas al acceso y posiblemente tener otro impacto no especificado a trav\u00e9s de vectores desconocidos, tambi\u00e9n conocido como SAP Security Note 2233550." } ], "id": "CVE-2016-6150", "lastModified": "2024-11-21T02:55:33.323", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:24.190", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/96" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92064" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/138453/SAP-HANA-DB-Encryption-Issue.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-potential-wrong-encryption" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the XS Administration Tools in SAP HANA allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en XS Administration Tools en SAP HANA permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-5172", "lastModified": "2024-11-21T02:11:32.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-07-31T14:55:04.143", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "url": "http://scn.sap.com/docs/DOC-8218" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2014/Jul/153" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/59634" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/532941/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/68952" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94922" }, { "source": "cve@mitre.org", "url": "https://service.sap.com/sap/support/notes/1993349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/127670/SAP-HANA-XS-Administration-Tool-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://scn.sap.com/docs/DOC-8218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Jul/153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/532941/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/68952" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://service.sap.com/sap/support/notes/1993349" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.091.00:*:*:*:*:*:*:*", "matchCriteriaId": "01F631DA-2C5D-4EE4-AB22-8B576322223F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The hdbsql client 1.00.091.00 Build 1418659308-1530 in SAP HANA allows local users to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors, aka SAP Security Note 2140700." }, { "lang": "es", "value": "El cliente hdbsql 1.00.091.00 Build 1418659308-1530 en SAP HANA permite a usuarios locales causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) y posiblemente tener otro imp\u00e1cto no especificado a trav\u00e9s de vectores desconocidos, tambi\u00e9n conocido como SAP Security Note 2140700." } ], "id": "CVE-2015-6507", "lastModified": "2024-11-21T02:35:06.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-15T20:59:00.113", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/109" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-multiple-memory-corruption-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/133760/SAP-HANA-hdbsql-Memory-Corruption.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-april-2015-edition" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-multiple-memory-corruption-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Web Dispatcher service in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to read web dispatcher and security trace files and possibly obtain passwords via unspecified vectors, aka SAP Security Note 2148854." }, { "lang": "es", "value": "el servicio Web Dispatcher en SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a atacantes remotos leer archivos web dispatcher y security trace y posiblemente obtener contrase\u00f1as a trav\u00e9s de vectores no especificados, tambi\u00e9n conocida como SAP Security Note 2148854." } ], "id": "CVE-2015-7991", "lastModified": "2024-11-21T02:37:47.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-11-10T17:59:06.993", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Nov/37" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Trace_Disclosure" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/134283/SAP-HANA-Remote-Trace-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Nov/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Trace_Disclosure" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/92062 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf | Third Party Advisory | |
cve@mitre.org | https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92062 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 allows remote attackers to execute arbitrary code via vectors involving the audit logs, aka SAP Security Note 2170806." }, { "lang": "es", "value": "SAP HANA DB 1.00.73.00.389160 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores que implican los registros de auditor\u00eda, tambi\u00e9n conocido como SAP Security Note 2170806." } ], "id": "CVE-2016-6143", "lastModified": "2024-11-21T02:55:32.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-13T14:59:01.870", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92062" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:*:*:*:*:*:*:*:*", "matchCriteriaId": "23408464-31ED-47D7-B215-2E363F16B14F", "versionEndIncluding": "1.00.73.00.389160", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as \"False,\" which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869." }, { "lang": "es", "value": "La interfaz SQL en SAP HANA en versiones anteriores a Revision 102 no limita el n\u00famero de intentos de inicio de sesi\u00f3n para el usuario SYSTEM cuando el password_lock_for_system_user no es apoyado o est\u00e1 configurado como \"False,\" lo que facilita a atacantes remotos eludir la autenticaci\u00f3n a trav\u00e9s de un ataque de fuerza bruta, tambi\u00e9n conocido como SAP Security Note 2216869." } ], "id": "CVE-2016-6144", "lastModified": "2024-11-21T02:55:32.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:15.110", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/91" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92065" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/106152 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2704878 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106152 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2704878 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7238BE98-063B-40E1-83D2-7F1424BB4C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "745FBCAF-940A-49F4-9DC9-26470F14DED7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The security audit log of SAP HANA, versions 1.0 and 2.0, does not log SELECT events if these events are part of a statement with the syntax CREATE TABLE \u003ctable_name\u003e AS SELECT." }, { "lang": "es", "value": "El registro de auditor\u00eda de seguridad interna en SAP HANA 1.0 y 2.0 no registra los eventos SELECT si forman parte de una instrucci\u00f3n con la sintaxis CREATE TABLE AS SELECT." } ], "id": "CVE-2018-2497", "lastModified": "2024-11-21T04:03:55.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-11T22:29:00.423", "references": [ { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106152" }, { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2704878" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2704878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in user creation in the Web-based Development Workbench in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to inject arbitrary web script or HTML via the username, aka SAP Security Note 2153898." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la creaci\u00f3n de usuario en el Web-based Development Workbench en SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del nombre de usuario, tambi\u00e9n conocida como SAP Security Note 2153898." } ], "id": "CVE-2015-7728", "lastModified": "2024-11-21T02:37:18.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-10-15T20:59:05.973", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/116" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-user-creation-through-web-based-development" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xss-user-creation-through-web-based-development" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://launchpad.support.sap.com/#/notes/2772376 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2772376 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7238BE98-063B-40E1-83D2-7F1424BB4C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "745FBCAF-940A-49F4-9DC9-26470F14DED7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SLD Registration in SAP HANA (fixed in versions 1.0, 2.0) does not sufficiently validate an XML document accepted from an untrusted source. The attacker can call SLDREG with an XML file containing a reference to an XML External Entity (XXE). This can cause SLDREG to, for example, continuously loop, read arbitrary files and even send local files." }, { "lang": "es", "value": "El registro de SLD en SAP HANA (corregido en las versiones 1.0, 2.0) no valida suficientemente un documento XML aceptado de una fuente no confiable. El atacante puede llamar a SLDREG con un archivo XML que contiene una referencia a una entidad externa XML (XXE). Esto puede hacer que SLDREG, por ejemplo, realice un bucle continuo, lea archivos arbitrarios e incluso env\u00ede archivos locales." } ], "id": "CVE-2019-0284", "lastModified": "2024-11-21T04:16:38.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-10T21:29:01.357", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2772376" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2772376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:*:*:*:*:developer:*:*:*", "matchCriteriaId": "2EC0D56B-F76F-4396-A0F2-86EDEDA025F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA Developer Edition Revision 70 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) epm/admin/DataGen.xsjs or (2) epm/services/multiply.xsjs in the democontent." }, { "lang": "es", "value": "Vulnerabilidad de XSS en SAP HANA Developer Edition Revision 70 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores sin especificar en (1) epm/admin/DataGen.xsjs o (2) epm/services/multiply.xsjs en el democontent." } ], "id": "CVE-2014-8314", "lastModified": "2024-11-21T02:18:50.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-10-16T19:55:20.113", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/docs/DOC-55451" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2014/Oct/37" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-027" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533644/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/70307" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96878" }, { "source": "cve@mitre.org", "url": "https://service.sap.com/sap/support/notes/2009696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/128598/SAP-HANA-Reflective-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/docs/DOC-55451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Oct/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533644/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://service.sap.com/sap/support/notes/2009696" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/102997 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | Vendor Advisory | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2572940 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102997 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2572940 | Permissions Required |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "3F2FF19E-60E0-43D1-81BA-282D4CD8517E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "FA82740E-3E8C-41DE-BC32-3099900C4F0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory." }, { "lang": "es", "value": "Bajo ciertas condiciones, SAP HANA 1.00 y 2.00 permite que un atacante no autenticado acceda a informaci\u00f3n que, de otra forma, estar\u00eda restringida. Un atacante puede emplear err\u00f3neamente la funci\u00f3n de autenticaci\u00f3n del servidor de SAP HANA en su interfaz de SQL y revelar 8 bytes de la memoria del proceso del servidor. El atacante no puede influenciar o predecir la ubicaci\u00f3n de la memoria filtrada." } ], "id": "CVE-2018-2369", "lastModified": "2024-11-21T04:03:41.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-14T12:29:00.280", "references": [ { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102997" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/" }, { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/2572940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/2572940" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sap | commoncryptolib | * | |
sap | sapcryptolib | * | |
sap | sapseculib | - | |
sap | hana | - | |
sap | netweaver | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:commoncryptolib:*:*:*:*:*:*:*:*", "matchCriteriaId": "C77FFE57-674C-4214-903E-7486310AC087", "versionEndIncluding": "8.4.29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapcryptolib:*:*:*:*:*:*:*:*", "matchCriteriaId": "1950C115-4304-4A2A-86CD-EC17DACFC313", "versionEndIncluding": "5.555.37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapseculib:-:*:*:*:*:*:*:*", "matchCriteriaId": "E77383EF-3BC3-4CB6-852B-4391310EDAE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:netweaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "5007E3B7-3C36-4256-9E01-51C6F52FD0FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors." }, { "lang": "es", "value": "SAPCRYPTOLIB anterior a 5.555.38, SAPSECULIB, y CommonCryptoLib anterior a 8.4.30, utilizados en SAP NetWeaver AS para ABAP y SAP HANA, permiten a atacantes remotos falsificar firmas Digital Signature Algorithm (DSA) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-8587", "lastModified": "2024-11-21T02:19:23.250", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-04T15:55:07.310", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/57606" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://service.sap.com/sap/support/notes/2067859" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://twitter.com/SAP_Gsupport/status/522401681997570048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/57606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://service.sap.com/sap/support/notes/2067859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://twitter.com/SAP_Gsupport/status/522401681997570048" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors in the (1) trace configuration page or (2) getSqlTraceConfiguration function, aka SAP Security Note 2153898." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en el Web-based Development Workbench en SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s de vectores no especificados en la (1) p\u00e1gina trace configuration o (2) funci\u00f3n getSqlTraceConfiguration, tambi\u00e9n conocidas como SAP Security Note 2153898." } ], "id": "CVE-2015-7727", "lastModified": "2024-11-21T02:37:18.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-15T20:59:05.050", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/115" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/117" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Trace-configuration-SQL-injection" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-getsqltraceconfiguration-function" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/133766/SAP-HANA-Trace-Configuration-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/133768/SAP-HANA-getSqlTraceConfiguration-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Trace-configuration-SQL-injection" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-getsqltraceconfiguration-function" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XS engine in SAP HANA allows remote attackers to spoof log entries in trace files and consequently cause a denial of service (disk consumption and process crash) via a crafted HTTP request, related to an unspecified debug function, aka SAP Security Note 2241978." }, { "lang": "es", "value": "El motor XS en SAP HANA permite a atacantes remotos suplantar entradas de archivos de registro de seguimiento y consecuentemente provocar una denegaci\u00f3n de servicio (consumo de disco y ca\u00edda del proceso) a trav\u00e9s de una petici\u00f3n HTTP manipulada, relacionado con una funci\u00f3n de depuraci\u00f3n no especificada, tambi\u00e9n conocido como SAP Security Note 2241978." } ], "id": "CVE-2016-1929", "lastModified": "2024-11-21T02:47:22.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 7.8, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-20T16:59:07.817", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Apr/59" }, { "source": "cve@mitre.org", "url": "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/" }, { "source": "cve@mitre.org", "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Apr/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/advisories/erpscan-16-002-sap-hana-log-injection-and-no-size-restriction/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana:1.00.80.00.391861:*:*:*:developer:*:*:*", "matchCriteriaId": "64FC9785-0916-4B68-8EB5-D13A4BA1649B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA 73 (1.00.73.00.389160) and HANA Developer Edition 80 (1.00.80.00.391861) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) ide/core/plugins/editor/templates/trace/hanaTraceDetailService.xsjs or (2) xs/ide/editor/templates/trace/hanaTraceDetailService.xsjs, aka SAP Note 2069676." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en SAP HANA 73 (1.00.73.00.389160) y HANA Developer Edition 80 (1.00.80.00.391861) permiten a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s de vectores no especificados en (1) ide/core/plugins/editor/templates/trace/hanaTraceDetailService.xsjs o (2) xs/ide/editor/templates/trace/hanaTraceDetailService.xsjs, tambi\u00e9n conocido como SAP Nota 2069676." } ], "id": "CVE-2015-2072", "lastModified": "2024-11-21T02:26:42.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-02-27T15:59:01.273", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Feb/91" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/534747/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/72773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130519/SAP-HANA-Web-based-Development-Workbench-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2015/Feb/91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534747/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72773" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.091.00:*:*:*:*:*:*:*", "matchCriteriaId": "01F631DA-2C5D-4EE4-AB22-8B576322223F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allow remote authenticated users to execute arbitrary SQL commands via the (1) remoteSourceName in the dropCredentials function or unspecified vectors in the (2) setTraceLevelsForXsApps, (3) _modifyUser, or (4) _newUser function, aka SAP Security Notes 2153898 and 2153765." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en el Web-based Development Workbench en SAP HANA DB 1.00.091.00.1418659308 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s de (1) remoteSourceName en la funci\u00f3n dropCredentials o vectores no especificados en la funci\u00f3n (2) setTraceLevelsForXsApps, (3) _modifyUser o (4) _newUser, tambi\u00e9n conocidas como SAP Security Notes 2153898 y 2153765." } ], "id": "CVE-2015-7725", "lastModified": "2024-11-21T02:37:17.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-15T20:59:02.833", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/110" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/111" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/113" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/118" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-drop-credentials-sql-injection" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-modifyuser" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-newuser" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-sql-injection-settracelevelsforxsapps" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-drop-credentials-sql-injection" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-modifyuser" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-sql-injection-newuser" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-sql-injection-settracelevelsforxsapps" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to cause a denial of service (memory corruption and indexserver crash) via unspecified vectors to the EXECUTE_SEARCH_RULE_SET stored procedure, aka SAP Security Note 2175928." }, { "lang": "es", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda de indexserver) a trav\u00e9s de vectores no especificados en el procedimiento EXECUTE_SEARCH_RULE_SET almacenado, tambi\u00e9n conocida como SAP Security Note 2175928." } ], "id": "CVE-2015-7992", "lastModified": "2024-11-21T02:37:47.973", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-11-10T17:59:08.040", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html" }, { "source": "cve@mitre.org", "url": "http://scn.sap.com/community/security/blog/2015/08/18/sap-security-notes-august-2015" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Nov/38" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_EXECUTE_SEARCH_RULE_SET_Stored_Procedure_Memory_corruption" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/134284/SAP-HANA-EXECUTE_SEARCH_RULE_SET-Stored-Procedure-Memory-Corruption.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://scn.sap.com/community/security/blog/2015/08/18/sap-security-notes-august-2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Nov/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/research/security-advisories/SAP_HANA_EXECUTE_SEARCH_RULE_SET_Stored_Procedure_Memory_corruption" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SQL interface in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to \"SQL Login,\" aka SAP Security Note 2197428." }, { "lang": "es", "value": "La interfaz SQL en SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados relacionados con \u0027SQL Login,\u0027 tambi\u00e9n conocida como SAP Security Note 2197428." } ], "id": "CVE-2015-7994", "lastModified": "2024-11-21T02:37:48.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-11-10T17:59:10.573", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Nov/40" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_SQL_based" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/134287/SAP-HANA-SQL-Login-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Nov/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_SQL_based" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HANA ICM process in SAP HANA allows remote attackers to obtain the platform version, host name, instance number, and possibly other sensitive information via a malformed HTTP GET request." }, { "lang": "es", "value": "El proceso HANA ICM en SAP HANA permite a atacantes remotos obtener la versi\u00f3n plataforma, nombre de host, n\u00famero de instancia y posiblemente otra informaci\u00f3n sensible a trav\u00e9s de una solicitud HTTP GET malformada." } ], "id": "CVE-2014-2749", "lastModified": "2024-11-21T02:06:53.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-04-10T20:55:06.337", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57443" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-001" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/research-advisories.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/66675" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92325" }, { "source": "cve@mitre.org", "url": "https://service.sap.com/sap/support/notes/1914778" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/research-advisories.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/92325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://service.sap.com/sap/support/notes/1914778" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The grant.xsfunc application in testApps/grantAccess/ in the XS Engine in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to spoof log entries via a crafted request, aka SAP Security Note 2109818." }, { "lang": "es", "value": "La aplicaci\u00f3n grant.xsfunc en testApps/grantAccess/ en el motor XS en SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a usuarios remotos autenticados falsificar entradas del registro a trav\u00e9s de una solicitud manipulada, tambi\u00e9n conocido como la nota de seguridad de SAP 2109818." } ], "id": "CVE-2015-3994", "lastModified": "2024-11-21T02:30:13.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-29T15:59:14.767", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/May/118" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535618/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/74859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/May/118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535618/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74859" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9CA89D1-AAEC-4696-9A99-6F8BBB7EBE7D", "versionEndIncluding": "1.00.095", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The index server (hdbindexserver) in SAP HANA 1.00.095 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTTP request, aka SAP Security Note 2197428." }, { "lang": "es", "value": "El servidor index (hdbindexserver) en SAP HANA 1.00.095 permite a atacantes remotos ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de una petici\u00f3n HTTP, tambi\u00e9n conocida como SAP Security Note 2197428." } ], "id": "CVE-2015-7986", "lastModified": "2024-11-21T02:37:47.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-27T16:59:09.543", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Jan/94" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/537376/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/39382/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Jan/94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/537376/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/39382/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Data Provisioning Agent (aka DP Agent) in SAP HANA does not properly restrict access to service functionality, which allows remote attackers to obtain sensitive information, gain privileges, and conduct unspecified other attacks via unspecified vectors, aka SAP Security Note 2262742." }, { "lang": "es", "value": "El Data Provisioning Agent (tambi\u00e9n conocido como DP Agent) en SAP HANA no restringe correctamente el acceso a la funcionalidad de servicio, lo que permite a atacantes remotos obtener informaci\u00f3n sensible, obtener privilegios y llevar a cabo otros ataques no especificados a trav\u00e9s de vectores no especificados, tambi\u00e9n conocida como SAP Security Note 2262742." } ], "id": "CVE-2016-4018", "lastModified": "2024-11-21T02:51:10.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-14T14:59:12.913", "references": [ { "source": "cve@mitre.org", "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.091.00:*:*:*:developer:*:*:*", "matchCriteriaId": "AA5861CD-F3E7-418D-BE62-B322C5151FEC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eval injection in test-net.xsjs in the Web-based Development Workbench in SAP HANA Developer Edition DB 1.00.091.00.1418659308 allows remote authenticated users to execute arbitrary XSJS code via unspecified vectors, aka SAP Security Note 2153892." }, { "lang": "es", "value": "Inyecci\u00f3n eval en test-net.xsjs en el Web-based Development Workbench en SAP HANA Developer Edition DB 1.00.091.00.1418659308 permite a usuarios remotos autenticados ejecutar c\u00f3digo XSJS arbitrario a trav\u00e9s de vectores no especificados, tambi\u00e9n conocida como SAP Security Note 2153892." } ], "id": "CVE-2015-7729", "lastModified": "2024-11-21T02:37:18.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-10-15T20:59:06.990", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Sep/112" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xsjs-code-injection-test-net" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/133763/SAP-HANA-test-net.xsjs-Code-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Sep/112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/sap-hana-xsjs-code-injection-test-net" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/102452 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/ | Vendor Advisory | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2575750 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102452 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2575750 | Permissions Required |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "3F2FF19E-60E0-43D1-81BA-282D4CD8517E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "FA82740E-3E8C-41DE-BC32-3099900C4F0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform\u0027s hostname." }, { "lang": "es", "value": "Un atacante remoto no autenticado en SAP HANA 1.00 y 2.00 podr\u00eda enviar peticiones SOAP especialmente manipuladas a SAP Startup Service y revelar informaci\u00f3n como el nombre del host de la plataforma." } ], "id": "CVE-2018-2362", "lastModified": "2024-11-21T04:03:40.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-09T15:29:00.307", "references": [ { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102452" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/" }, { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/2575750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/2575750" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Eval injection in ide/core/base/server/net.xsjs in the Developer Workbench in SAP HANA allows remote attackers to execute arbitrary XSJX code via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n eval en ide/core/base/server/net.xsjs en Developer Workbench de SAP HANA permite a atacantes remotos ejecutar c\u00f3digo XSJS arbitrario a trav\u00e9s de vectores sin especificar." } ], "id": "CVE-2014-8313", "lastModified": "2024-11-21T02:18:50.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-16T19:55:20.050", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/docs/DOC-55451" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2014/Oct/36" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-028" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533643/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/70293" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96879" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://service.sap.com/sap/support/notes/2015446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/128597/SAP-HANA-Web-based-Development-Workbench-Code-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/docs/DOC-55451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2014/Oct/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533643/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://service.sap.com/sap/support/notes/2015446" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 allows remote attackers to cause a denial of service (process termination) or execute arbitrary code via vectors related to an IMPORT statement, aka SAP Security Note 2233136." }, { "lang": "es", "value": "SAP HANA DB 1.00.73.00.389160 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (terminaci\u00f3n de proceso) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores relacionados con una declaraci\u00f3n IMPORT, tambi\u00e9n conocido como SAP Security Note 2233136." } ], "id": "CVE-2016-6148", "lastModified": "2024-11-21T02:55:33.027", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:20.767", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/95" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92067" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/138450/SAP-HANA-DB-1.00.73.00.389160-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/95" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/02/Layer-Seven-Security_SAP-Security-Notes_January-2016.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-january-2016" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
8.4 (High) - CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/103369 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/ | Vendor Advisory | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2587369 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103369 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2587369 | Permissions Required, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "3F2FF19E-60E0-43D1-81BA-282D4CD8517E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "FA82740E-3E8C-41DE-BC32-3099900C4F0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In systems using the optional capture \u0026 replay functionality of SAP HANA, 1.00 and 2.00, (see SAP Note 2362820 for more information about capture \u0026 replay), user credentials may be stored in clear text in the indexserver trace files of the control system. An attacker with the required authorizations on the control system may be able to access the user credentials and gain unauthorized access to data in the captured or target system." }, { "lang": "es", "value": "En sistemas que empleen la funcionalidad opcional de captura por reproducci\u00f3n en SAP HANA, en versiones 1.00 y 2.00 (v\u00e9ase SAP Note 2362820 para m\u00e1s informaci\u00f3n sobre la captura por reproducci\u00f3n), las credenciales de usuario podr\u00edan almacenarse en texto claro en los archivos de trazas indexserver del sistema de control. Un atacante con las autorizaciones requeridas en el sistema de control podr\u00eda acceder a las credenciales de usuario y obtener acceso no autorizado a los datos en el sistema capturado u objetivo." } ], "id": "CVE-2018-2402", "lastModified": "2024-11-21T04:03:45.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 6.0, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.7, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-14T19:29:00.533", "references": [ { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103369" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/" }, { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2587369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2587369" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://launchpad.support.sap.com/#/notes/2829681 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2829681 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7238BE98-063B-40E1-83D2-7F1424BB4C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "745FBCAF-940A-49F4-9DC9-26470F14DED7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The administrator of SAP HANA database, before versions 1.0 and 2.0, can misuse HANA to execute commands with operating system \"root\" privileges." }, { "lang": "es", "value": "El administrador de la base de datos de SAP HANA, versiones anteriores a 1.0 y 2.0, puede hacer un uso inapropiado de HANA para ejecutar comandos con privilegios \"root\" del sistema operativo." } ], "id": "CVE-2019-0357", "lastModified": "2024-11-21T04:16:44.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-10T17:15:11.063", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2829681" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2829681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the XS engine (hdbxsengine) in SAP HANA allows remote attackers to cause a denial of service or execute arbitrary code via a crafted HTTP request, related to JSON, aka SAP Security Note 2241978." }, { "lang": "es", "value": "Desbordamiento de buffer en el motor XS (hdbxsengine) en SAP HANA permite a atacantes remotos provocar una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario a trav\u00e9s de una petici\u00f3n HTTP manipulada, relacionado con JSON, tambi\u00e9n conocido como SAP Security Note 2241978." } ], "id": "CVE-2016-1928", "lastModified": "2024-11-21T02:47:22.617", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-20T16:59:06.973", "references": [ { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Apr/65" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/538212/100/0/threaded" }, { "source": "cve@mitre.org", "url": "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/" }, { "source": "cve@mitre.org", "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Apr/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538212/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/advisories/erpscan-16-005-sap-hana-hdbxsengine-json-dos/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/press-center/blog/sap-security-notes-january-2016-review/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Extended Application Services (aka XS or XS Engine) in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to execute arbitrary code via unspecified vectors related to \"HTTP Login,\" aka SAP Security Note 2197397." }, { "lang": "es", "value": "Extended Application Services (tambi\u00e9n conocido como XS o XS Engine) en SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados relacionados con \u0027HTTP Login,\u0027 tambi\u00e9n conocida como SAP Security Note 2197397." } ], "id": "CVE-2015-7993", "lastModified": "2024-11-21T02:37:48.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-11-10T17:59:09.573", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Nov/39" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-september-2015" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_HTTP_based" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/134286/SAP-HANA-HTTP-Login-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Nov/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-september-2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/research/security-advisories/SAP_HANA_Remote_Code_Execution_HTTP_based" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E722FC-5FEF-4EE2-9A88-5CD4938283F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Data Provisioning Agent (aka DP Agent) in SAP HANA allows remote attackers to cause a denial of service (process crash) via unspecified vectors, aka SAP Security Note 2262710." }, { "lang": "es", "value": "El Data Provisioning Agent (tambi\u00e9n conocido como DP Agent) en SAP HANA permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de proceso) a trav\u00e9s de vectores no especificados, tambi\u00e9n conocida como SAP Security Note 2262710." } ], "id": "CVE-2016-4017", "lastModified": "2024-11-21T02:51:10.337", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-14T14:59:12.037", "references": [ { "source": "cve@mitre.org", "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/press-center/blog/dos-vulnerabilities-on-the-rise-sap-security-notes-april-2016/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:*:sp10:*:*:*:*:*:*", "matchCriteriaId": "6E3AEABF-FB14-43B0-9D5D-5A3206F199DD", "versionEndIncluding": "1.00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583." }, { "lang": "es", "value": "SAP HANA Database 1.00 SPS10 y anteriores no requiere autenticaci\u00f3n, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario o tener otro impacto no especificado a trav\u00e9s de un paquete TrexNet al m\u00e9todo (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop o (17) pythonexec, tambi\u00e9n conocida como SAP Security Note 2165583." } ], "id": "CVE-2015-7828", "lastModified": "2024-11-21T02:37:28.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-11-10T17:59:05.507", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/Nov/36" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Nov/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to inject arbitrary audit trail fields into the SYSLOG via vectors related to the SQL protocol, aka SAP Security Note 2197459." }, { "lang": "es", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a atacantes remotos inyectar campos de seguimiento de auditoria arbitrarios en el SYSLOG a trav\u00e9s de vectores relacionados con el protocolo SQL, tambi\u00e9n conocida como SAP Security Note 2197459." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/117.html\"\u003eCWE-117: Improper Output Neutralization for Logs\u003c/a\u003e", "id": "CVE-2016-6142", "lastModified": "2024-11-21T02:55:32.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-09-26T16:59:02.257", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://onapsis.com/research/security-advisories/sap-hana-arbitrary-audit-injection-sql-protocol" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/89" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://onapsis.com/research/security-advisories/sap-hana-arbitrary-audit-injection-sql-protocol" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/138441/SAP-HANA-DB-1.00.73.00.389160-SAP-Protocol-Audit-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/89" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92566" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/105324 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2681207 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105324 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2681207 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "7238BE98-063B-40E1-83D2-7F1424BB4C30", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "745FBCAF-940A-49F4-9DC9-26470F14DED7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP HANA (versions 1.0 and 2.0) Extended Application Services classic model OData parser does not sufficiently validate XML. By exploiting, an unauthorized hacker can cause the database server to crash." }, { "lang": "es", "value": "El analizador OData modelo cl\u00e1sico de SAP HANA (versiones 1.0 y 2.0) Extended Application Services no valida suficientemente los XML. Mediante su explotaci\u00f3n, un hacker no autorizado podr\u00eda provocar el cierre inesperado del servidor de la base de datos." } ], "id": "CVE-2018-2465", "lastModified": "2024-11-21T04:03:51.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-11T15:29:02.127", "references": [ { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105324" }, { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2681207" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2681207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://launchpad.support.sap.com/#/notes/3017378 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/3017378 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "745FBCAF-940A-49F4-9DC9-26470F14DED7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind." }, { "lang": "es", "value": "Una autenticaci\u00f3n LDAP en SAP HANA Database versi\u00f3n 2.0, puede ser omitido si el servidor de directorio LDAP adjunto est\u00e1 configurado para habilitar un enlace no autenticado" } ], "id": "CVE-2021-21484", "lastModified": "2024-11-21T05:48:27.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.5, "source": "cna@sap.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-09T15:15:14.867", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/3017378" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/3017378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*", "matchCriteriaId": "839E6AE8-912B-4C81-9E96-1F2190A0B673", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to read arbitrary files via an IMPORT FROM SQL statement, aka SAP Security Note 2109565." }, { "lang": "es", "value": "SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) permite a usuarios remotos autenticados leer ficheros arbitrarios a trav\u00e9s de una declaraci\u00f3n IMPORT FROM SQL, tambi\u00e9n conocido como la nota de seguridad de SAP 2109565." } ], "id": "CVE-2015-3995", "lastModified": "2024-11-21T02:30:13.967", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-29T15:59:16.267", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2015/May/119" }, { "source": "cve@mitre.org", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Information-Disclosure-via-SQL-IMPORT-FROM-statement" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/535619/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/74861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/132066/SAP-HANA-Information-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/May/119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.onapsis.com/research/security-advisories/SAP-HANA-Information-Disclosure-via-SQL-IMPORT-FROM-statement" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/535619/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74861" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:sap:hana:1.00.60.379371:*:*:*:*:*:*:*", "matchCriteriaId": "2D09C1C0-B520-44AD-991A-3844EF99A250", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in metadata.xsjs in SAP HANA 1.00.60.379371 allows remote attackers to execute arbitrary SQL commands via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en metadata.xsjs en SAP HANA 1.00.60.379371 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-8588", "lastModified": "2024-11-21T02:19:23.450", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-04T15:55:07.637", "references": [ { "source": "cve@mitre.org", "url": "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/" }, { "source": "cve@mitre.org", "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98579" }, { "source": "cve@mitre.org", "url": "https://service.sap.com/sap/support/notes/2067972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/advisories/erpscan-14-013-sap-hana-metadata-xsjs-sql-injection/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://service.sap.com/sap/support/notes/2067972" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201411-0218
Vulnerability from variot
SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors. Multiple SAP products are prone to to a security vulnerability that may allow attackers to conduct spoofing attacks. An attacker can exploit this issue to conduct spoofing attacks, disclose sensitive information and perform unauthorized actions. This may aid in further attacks. The following products are vulnerable: Versions prior to SAP SAPCRYPTOLIB 5.555.38 Versions prior to SAP SAPSECULIB 8.4.30 Versions prior to SAP CommonCryptoLib 8.4.30
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201411-0218", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sapseculib", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": null }, { "model": "netweaver", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "*" }, { "model": "sapcryptolib", "scope": "lte", "trust": 1.0, "vendor": "sap", "version": "5.555.37" }, { "model": "commoncryptolib", "scope": "lte", "trust": 1.0, "vendor": "sap", "version": "8.4.29" }, { "model": "hana", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": null }, { "model": "commoncryptolib", "scope": "eq", "trust": 0.9, "vendor": "sap", "version": "8.4.29" }, { "model": "commoncryptolib", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "8.4.30" }, { "model": "hana", "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": "netweaver", "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": "sapcryptolib", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "5.555.38" }, { "model": "sapseculib", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "8.4.30" }, { "model": "sapcrytolib", "scope": "eq", "trust": 0.6, "vendor": "sap", "version": "5.555.37" }, { "model": "sapseculib", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "8.4.29" }, { "model": "sapseculib", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "sapcryptolib", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "5.555.37" }, { "model": "sapcryptolib", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "netweaver abap", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "hana", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "commoncryptolib", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "sapseculib", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "8.4.30" }, { "model": "sapcryptolib", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "5.555.38" }, { "model": "commoncryptolib", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "8.4.30" } ], "sources": [ { "db": "BID", "id": "71027" }, { "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "db": "NVD", "id": "CVE-2014-8587" }, { "db": "CNNVD", "id": "CNNVD-201411-043" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sap:commoncryptolib:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.4.29", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:sapcryptolib:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.555.37", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:sapseculib:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-8587" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP", "sources": [ { "db": "BID", "id": "71027" } ], "trust": 0.3 }, "cve": "CVE-2014-8587", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-8587", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-8587", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201411-043", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "db": "NVD", "id": "CVE-2014-8587" }, { "db": "CNNVD", "id": "CNNVD-201411-043" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors. Multiple SAP products are prone to to a security vulnerability that may allow attackers to conduct spoofing attacks. \nAn attacker can exploit this issue to conduct spoofing attacks, disclose sensitive information and perform unauthorized actions. This may aid in further attacks. \nThe following products are vulnerable:\nVersions prior to SAP SAPCRYPTOLIB 5.555.38\nVersions prior to SAP SAPSECULIB 8.4.30\nVersions prior to SAP CommonCryptoLib 8.4.30", "sources": [ { "db": "NVD", "id": "CVE-2014-8587" }, { "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "db": "BID", "id": "71027" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-8587", "trust": 2.7 }, { "db": "SECUNIA", "id": "57606", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2014-005218", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201411-043", "trust": 0.6 }, { "db": "BID", "id": "71027", "trust": 0.3 } ], "sources": [ { "db": "BID", "id": "71027" }, { "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "db": "NVD", "id": "CVE-2014-8587" }, { "db": "CNNVD", "id": "CNNVD-201411-043" } ] }, "id": "VAR-201411-0218", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.27111164 }, "last_update_date": "2023-12-18T12:38:08.069000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP Security Note 2067859", "trust": 0.8, "url": "http://scn.sap.com/docs/doc-55451" }, { "title": "Potential Exposure to Digital Signature Spoofing #ABAP #Netweaver #SAP Note 2067859 http://ow.ly/CMsqF", "trust": 0.8, "url": "https://twitter.com/sap_gsupport/status/522401681997570048" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005218" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "db": "NVD", "id": "CVE-2014-8587" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/" }, { "trust": 1.9, "url": "http://service.sap.com/sap/support/notes/2067859" }, { "trust": 1.6, "url": "http://secunia.com/advisories/57606" }, { "trust": 1.6, "url": "https://twitter.com/sap_gsupport/status/522401681997570048" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8587" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8587" }, { "trust": 0.3, "url": "http://www.saphana.com/welcome" }, { "trust": 0.3, "url": "http://scn.sap.com/community/netweaver-portal" } ], "sources": [ { "db": "BID", "id": "71027" }, { "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "db": "NVD", "id": "CVE-2014-8587" }, { "db": "CNNVD", "id": "CNNVD-201411-043" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "71027" }, { "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "db": "NVD", "id": "CVE-2014-8587" }, { "db": "CNNVD", "id": "CNNVD-201411-043" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-15T00:00:00", "db": "BID", "id": "71027" }, { "date": "2014-11-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "date": "2014-11-04T15:55:07.310000", "db": "NVD", "id": "CVE-2014-8587" }, { "date": "2014-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-043" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-10-15T00:00:00", "db": "BID", "id": "71027" }, { "date": "2014-11-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005218" }, { "date": "2023-10-03T15:48:10.677000", "db": "NVD", "id": "CVE-2014-8587" }, { "date": "2014-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201411-043" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-043" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP NetWeaver AS ABAP and SAP HANA Used in SAPCRYPTOLIB In products such as DSA Vulnerability that is forged as a signature", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005218" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201411-043" } ], "trust": 0.6 } }
var-201407-0407
Vulnerability from variot
Multiple cross-site scripting (XSS) vulnerabilities in the XS Administration Tools in SAP HANA allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. SAP HANA is a combination of software and hardware that provides high-performance data query functions. Users can directly query and analyze large amounts of real-time business data without modeling and aggregating business data. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
By downloading this advisory from the Onapsis Resource Center, you will gain access to beforehand information on upcoming advisories, presentations and new research projects from the Onapsis Research Labs, as well as exclusive access to special promotions for upcoming trainings and conferences.
Risk Level: Medium
-
Advisory Information
-
- Public Release Date: 2014-07-29
-
- Subscriber Notification Date: 2014-07-29
-
- Last Revised: 2014-07-25
-
- Security Advisory ID: ONAPSIS-2014-025
-
- Onapsis SVS ID: ONAPSIS-00128/129/130
-
- Researcher: Will Vandevanter
-
- Initial Base CVSS v2: 4.3 (AV:N/AC:M/AU:N/C:N/I:P/A:N)
-
Vulnerability Information
-
- Vendor: SAP
-
- Affected Components:
-
SAP HANA (Check SAP Note 1993349 for detailed information on affected releases)
-
- Vulnerability Class: Improper Neutralization of Input During Web Page Generation - Reflected Cross Site Scripting (CWE-9)
-
- Remotely Exploitable: Yes
-
- Locally Exploitable: No
-
- Authentication Required: No
-
- Detection Module available in Onapsis X1: Yes
-
- Original Advisory: http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025
Reflected cross-site scripting can be used to steal another user's authentication information, such as data relating to their current session. An attacker who gains access to this data may use it to impersonate the user and access all information with the same rights as the target user. If an administrator is impersonated, the security of the application may be fully compromised.
Technical details about this issue are not disclosed at this moment with the purpose of providing enough time to affected customers to patch their systems and protect against the exploitation of the described vulnerability.
- Solution
SAP has released SAP Note 1993349 which provides patched versions of the affected components.
The patches can be downloaded from https://service.sap.com/sap/support/notes/1993349.
Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.
- Report Timeline
2014-03-05: Onapsis provides vulnerability information to SAP AG. 2014-03-06: SAP confirms having the information of vulnerability. 2014-04-08: SAP releases security patches. 2014-07-29: Onapsis notifies availability of security advisory.
About Onapsis, Inc.
Onapsis provides innovative security software solutions to protect ERP systems from cyber-attacks. Through unmatched ERP security, compliance and continuous monitoring products, Onapsis secures the business-critical infrastructure of its global customers against espionage, sabotage and financial fraud threats.
Onapsis X1, the company's flagship product, is the industry's first comprehensive solution for the automated security assessment of SAP platforms. Being the first and only SAP-certified solution of its kind, Onapsis X1 allows customers to perform automated Vulnerability Assessments, Security & Compliance Audits and Penetration Tests over their entire SAP platform.
Onapsis is backed by the Onapsis Research Labs, a world-renowned team of SAP & ERP security experts who are continuously invited to lecture at the leading IT security conferences, such as RSA and BlackHat, and featured by mainstream media such as CNN, Reuters, IDG and New York Times.
For further information about our solutions, please contact us at info@onapsis.com and visit our website at www.onapsis.com. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Onapsis Research Team
iEYEARECAAYFAlPXtbEACgkQz3i6WNVBcDUm6ACgx0Q/LGvyZZI3o4zgdO9jISby r8oAnj4cEwjlkzycvD4il3z0e/JujVH2 =aEdj -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201407-0407", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "hana", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": null }, { "model": "hana", "scope": null, "trust": 1.4, "vendor": "sap", "version": null }, { "model": "hana", "scope": "eq", "trust": 0.2, "vendor": "sap", "version": "*" } ], "sources": [ { "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05311" }, { "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "db": "NVD", "id": "CVE-2014-5172" }, { "db": "CNNVD", "id": "CNNVD-201407-730" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sap:hana:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-5172" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Will Vandevanter", "sources": [ { "db": "BID", "id": "68952" }, { "db": "PACKETSTORM", "id": "127670" }, { "db": "CNNVD", "id": "CNNVD-201407-730" } ], "trust": 1.0 }, "cve": "CVE-2014-5172", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2014-5172", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2014-05311", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-5172", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2014-05311", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201407-730", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05311" }, { "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "db": "NVD", "id": "CVE-2014-5172" }, { "db": "CNNVD", "id": "CNNVD-201407-730" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple cross-site scripting (XSS) vulnerabilities in the XS Administration Tools in SAP HANA allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. SAP HANA is a combination of software and hardware that provides high-performance data query functions. Users can directly query and analyze large amounts of real-time business data without modeling and aggregating business data. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. \n\nBy downloading this advisory from the Onapsis Resource Center, you will\ngain access to beforehand information on upcoming advisories,\npresentations and new research projects from the Onapsis Research Labs,\nas well as exclusive access to special promotions for upcoming trainings\nand conferences. \n\n\n1. \n\nRisk Level: Medium\n\n\n2. Advisory Information\n\n- - Public Release Date: 2014-07-29\n\n- - Subscriber Notification Date: 2014-07-29\n\n- - Last Revised: 2014-07-25\n\n- - Security Advisory ID: ONAPSIS-2014-025\n\n- - Onapsis SVS ID: ONAPSIS-00128/129/130\n\n- - Researcher: Will Vandevanter\n\n- - Initial Base CVSS v2: 4.3 (AV:N/AC:M/AU:N/C:N/I:P/A:N)\n\n3. Vulnerability Information\n\n- - Vendor: SAP\n\n- - Affected Components:\n - SAP HANA\n (Check SAP Note 1993349 for detailed information on affected releases)\n\n- - Vulnerability Class: Improper Neutralization of Input During Web\nPage Generation - Reflected Cross Site Scripting (CWE-9)\n\n- - Remotely Exploitable: Yes\n\n- - Locally Exploitable: No\n\n- - Authentication Required: No\n\n- - Detection Module available in Onapsis X1: Yes\n\n- - Original Advisory:\nhttp://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025\n\n\n4. \n\n5. \n\nReflected cross-site scripting can be used to steal another user\u0027s\nauthentication information, such as data relating to their current\nsession. An attacker who gains access to this data may use it to\nimpersonate the user and access all information with the same rights as\nthe target user. If an administrator is impersonated, the security of\nthe application may be fully compromised. \n\nTechnical details about this issue are not disclosed at this moment with\nthe purpose of providing enough time to affected customers to patch\ntheir systems and protect against the exploitation of the described\nvulnerability. \n\n6. Solution\n\nSAP has released SAP Note 1993349 which provides patched versions of the\naffected components. \n\nThe patches can be downloaded from\nhttps://service.sap.com/sap/support/notes/1993349. \n\nOnapsis strongly recommends SAP customers to download the related\nsecurity fixes and apply them to the affected components in order to\nreduce business risks. \n\n\n7. Report Timeline\n\n2014-03-05: Onapsis provides vulnerability information to SAP AG. \n2014-03-06: SAP confirms having the information of vulnerability. \n2014-04-08: SAP releases security patches. \n2014-07-29: Onapsis notifies availability of security advisory. \n\nAbout Onapsis, Inc. \n\nOnapsis provides innovative security software solutions to protect ERP\nsystems from cyber-attacks. Through unmatched ERP security, compliance\nand continuous monitoring products, Onapsis secures the\nbusiness-critical infrastructure of its global customers against\nespionage, sabotage and financial fraud threats. \n\nOnapsis X1, the company\u0027s flagship product, is the industry\u0027s first\ncomprehensive solution for the automated security assessment of SAP\nplatforms. Being the first and only SAP-certified solution of its kind,\nOnapsis X1 allows customers to perform automated Vulnerability\nAssessments, Security \u0026 Compliance Audits and Penetration Tests over\ntheir entire SAP platform. \n\nOnapsis is backed by the Onapsis Research Labs, a world-renowned team of\nSAP \u0026 ERP security experts who are continuously invited to lecture at\nthe leading IT security conferences, such as RSA and BlackHat, and\nfeatured by mainstream media such as CNN, Reuters, IDG and New York Times. \n\nFor further information about our solutions, please contact us at\ninfo@onapsis.com and visit our website at www.onapsis.com. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\nComment: Onapsis Research Team\n\niEYEARECAAYFAlPXtbEACgkQz3i6WNVBcDUm6ACgx0Q/LGvyZZI3o4zgdO9jISby\nr8oAnj4cEwjlkzycvD4il3z0e/JujVH2\n=aEdj\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2014-5172" }, { "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "db": "CNVD", "id": "CNVD-2014-05311" }, { "db": "BID", "id": "68952" }, { "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "127670" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-5172", "trust": 2.7 }, { "db": "BID", "id": "68952", "trust": 1.9 }, { "db": "PACKETSTORM", "id": "127670", "trust": 1.7 }, { "db": "SECUNIA", "id": "59634", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2014-05311", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-003655", "trust": 0.8 }, { "db": "XF", "id": "94922", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201407-730", "trust": 0.6 }, { "db": "IVD", "id": "87E78C04-1EC2-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05311" }, { "db": "BID", "id": "68952" }, { "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "db": "PACKETSTORM", "id": "127670" }, { "db": "NVD", "id": "CVE-2014-5172" }, { "db": "CNNVD", "id": "CNNVD-201407-730" } ] }, "id": "VAR-201407-0407", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05311" } ], "trust": 0.08 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05311" } ] }, "last_update_date": "2023-12-18T13:48:58.389000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP Security Note 1993349", "trust": 0.8, "url": "http://scn.sap.com/docs/doc-8218" }, { "title": "SAP HANA", "trust": 0.8, "url": "http://www.saphana.com/welcome" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003655" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "db": "NVD", "id": "CVE-2014-5172" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-025" }, { "trust": 1.6, "url": "http://packetstormsecurity.com/files/127670/sap-hana-xs-administration-tool-cross-site-scripting.html" }, { "trust": 1.6, "url": "http://scn.sap.com/docs/doc-8218" }, { "trust": 1.6, "url": "http://seclists.org/fulldisclosure/2014/jul/153" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/68952" }, { "trust": 1.6, "url": "https://service.sap.com/sap/support/notes/1993349" }, { "trust": 1.4, "url": "http://www.securityfocus.com/archive/1/archive/1/532941/100/0/threaded" }, { "trust": 1.0, "url": "http://secunia.com/advisories/59634" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/532941/100/0/threaded" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94922" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-5172" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-5172" }, { "trust": 0.6, "url": "http://secunia.com/advisories/59634/" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/94922" }, { "trust": 0.3, "url": "http://www.sap.com" }, { "trust": 0.1, "url": "https://service.sap.com/sap/support/notes/1993349." }, { "trust": 0.1, "url": "https://www.onapsis.com." }, { "trust": 0.1, "url": "http://www.onapsis.com/." } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05311" }, { "db": "BID", "id": "68952" }, { "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "db": "PACKETSTORM", "id": "127670" }, { "db": "NVD", "id": "CVE-2014-5172" }, { "db": "CNNVD", "id": "CNNVD-201407-730" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05311" }, { "db": "BID", "id": "68952" }, { "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "db": "PACKETSTORM", "id": "127670" }, { "db": "NVD", "id": "CVE-2014-5172" }, { "db": "CNNVD", "id": "CNNVD-201407-730" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-08-29T00:00:00", "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "date": "2014-08-29T00:00:00", "db": "CNVD", "id": "CNVD-2014-05311" }, { "date": "2014-07-29T00:00:00", "db": "BID", "id": "68952" }, { "date": "2014-08-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "date": "2014-07-29T23:04:09", "db": "PACKETSTORM", "id": "127670" }, { "date": "2014-07-31T14:55:04.143000", "db": "NVD", "id": "CVE-2014-5172" }, { "date": "2014-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-730" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-08-29T00:00:00", "db": "CNVD", "id": "CNVD-2014-05311" }, { "date": "2014-08-05T00:19:00", "db": "BID", "id": "68952" }, { "date": "2014-08-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-003655" }, { "date": "2018-10-09T19:50:00.053000", "db": "NVD", "id": "CVE-2014-5172" }, { "date": "2014-08-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201407-730" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-730" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP HANA XS Administration Tool Cross-Site Scripting Vulnerability", "sources": [ { "db": "IVD", "id": "87e78c04-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201407-730" } ], "trust": 0.6 } }