All the vulnerabilites related to sap - trex
cve-2016-6147
Vulnerability from cvelistv5
Published
2016-08-05 14:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
An unspecified interface in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands with SIDadm privileges via unspecified vectors, aka SAP Security Note 2234226.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/92066 | vdb-entry, x_refsource_BID | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-february-2016 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Aug/94 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html | x_refsource_MISC | |
https://www.onapsis.com/research/security-advisories/sap-trex-remote-command-execution-0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:19.740Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "92066", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92066" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-february-2016" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-034: SAP TREX remote command execution", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/94" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-command-execution-0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An unspecified interface in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands with SIDadm privileges via unspecified vectors, aka SAP Security Note 2234226." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "92066", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92066" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-february-2016" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-034: SAP TREX remote command execution", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/94" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-command-execution-0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6147", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unspecified interface in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands with SIDadm privileges via unspecified vectors, aka SAP Security Note 2234226." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "92066", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92066" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-february-2016", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-february-2016" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-034: SAP TREX remote command execution", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/94" }, { "name": "http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-command-execution-0", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-command-execution-0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6147", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:19.740Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-7691
Vulnerability from cvelistv5
Published
2017-04-11 21:00
Modified
2024-08-05 16:12
Severity ?
EPSS score ?
Summary
A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/97567 | vdb-entry, x_refsource_BID | |
https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:12:27.989Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "97567", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97567" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-11T00:00:00", "descriptions": [ { "lang": "en", "value": "A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-14T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "97567", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97567" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7691", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "97567", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97567" }, { "name": "https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/", "refsource": "CONFIRM", "url": "https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7691", "datePublished": "2017-04-11T21:00:00", "dateReserved": "2017-04-11T00:00:00", "dateUpdated": "2024-08-05T16:12:27.989Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6139
Vulnerability from cvelistv5
Published
2016-08-05 14:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/92063 | vdb-entry, x_refsource_BID | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Aug/115 | mailing-list, x_refsource_FULLDISC | |
http://seclists.org/fulldisclosure/2016/Aug/87 | mailing-list, x_refsource_FULLDISC | |
https://www.onapsis.com/research/security-advisories/sap-trex-remote-file-read | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html" }, { "name": "92063", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92063" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-021: SAP TREX Remote file read", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/115" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-021: SAP TREX Remote file read", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/87" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-file-read" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html" }, { "name": "92063", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92063" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-021: SAP TREX Remote file read", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/115" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-021: SAP TREX Remote file read", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/87" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-file-read" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html" }, { "name": "92063", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92063" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-021: SAP TREX Remote file read", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/115" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-021: SAP TREX Remote file read", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/87" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-file-read", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-file-read" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6139", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6140
Vulnerability from cvelistv5
Published
2016-08-05 14:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
SAP TREX 7.10 Revision 63 allows remote attackers to write to arbitrary files via vectors related to RFC-Gateway, aka SAP Security Note 2203591.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html | x_refsource_MISC | |
https://www.onapsis.com/research/security-advisories/sap-trex-arbitrary-file-write | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Aug/88 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/92069 | vdb-entry, x_refsource_BID | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-arbitrary-file-write" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-022: SAP TREX Arbitrary file write", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/88" }, { "name": "92069", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92069" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP TREX 7.10 Revision 63 allows remote attackers to write to arbitrary files via vectors related to RFC-Gateway, aka SAP Security Note 2203591." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-arbitrary-file-write" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-022: SAP TREX Arbitrary file write", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/88" }, { "name": "92069", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92069" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP TREX 7.10 Revision 63 allows remote attackers to write to arbitrary files via vectors related to RFC-Gateway, aka SAP Security Note 2203591." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-trex-arbitrary-file-write", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-trex-arbitrary-file-write" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-022: SAP TREX Arbitrary file write", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/88" }, { "name": "92069", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92069" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6140", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6138
Vulnerability from cvelistv5
Published
2016-08-05 14:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591.
References
▼ | URL | Tags |
---|---|---|
http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review | x_refsource_MISC | |
https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf | x_refsource_MISC | |
http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html | x_refsource_MISC | |
https://www.onapsis.com/research/security-advisories/sap-trex-remote-directory-traversal | x_refsource_MISC | |
http://www.securityfocus.com/bid/92060 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2016/Aug/114 | mailing-list, x_refsource_FULLDISC | |
http://seclists.org/fulldisclosure/2016/Aug/86 | mailing-list, x_refsource_FULLDISC | |
https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.547Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-directory-traversal" }, { "name": "92060", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92060" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-020: SAP TREX Remote Directory Traversal", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/114" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-020: SAP TREX Remote Directory Traversal", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/86" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "tags": [ "x_refsource_MISC" ], "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-directory-traversal" }, { "name": "92060", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92060" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-020: SAP TREX Remote Directory Traversal", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/114" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-020: SAP TREX Remote Directory Traversal", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/86" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review", "refsource": "MISC", "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "name": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf", "refsource": "MISC", "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "name": "http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-directory-traversal", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-directory-traversal" }, { "name": "92060", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92060" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-020: SAP TREX Remote Directory Traversal", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/114" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-020: SAP TREX Remote Directory Traversal", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/86" }, { "name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6138", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.547Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6137
Vulnerability from cvelistv5
Published
2016-09-27 15:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
An unspecified function in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands via unknown vectors, aka SAP Security Note 2203591.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2016/Aug/85 | mailing-list, x_refsource_FULLDISC | |
http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution | x_refsource_MISC | |
http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2016/Aug/113 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:19.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-019: SAP TREX Remote Command Execution", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/85" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-019: SAP TREX Remote Command Execution", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/113" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "An unspecified function in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands via unknown vectors, aka SAP Security Note 2203591." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-09-27T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-019: SAP TREX Remote Command Execution", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/85" }, { "tags": [ "x_refsource_MISC" ], "url": "http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-019: SAP TREX Remote Command Execution", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/113" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6137", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unspecified function in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands via unknown vectors, aka SAP Security Note 2203591." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-019: SAP TREX Remote Command Execution", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/85" }, { "name": "http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution", "refsource": "MISC", "url": "http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution" }, { "name": "http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "name": "20160823 Re: Onapsis Security Advisory ONAPSIS-2016-019: SAP TREX Remote Command Execution", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/113" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6137", "datePublished": "2016-09-27T15:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:19.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6146
Vulnerability from cvelistv5
Published
2016-09-27 15:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
The NameServer in SAP TREX 7.10 Revision 63 allows remote attackers to obtain sensitive TNS information via an unspecified query, aka SAP Security Note 2234226.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://onapsis.com/research/security-advisories/sap-trex-tns-information-disclosure-nameserver" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/03/Layer-Seven-Security_SAP-Security-Notes_February-2016.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-033: SAP TREX TNS Information Disclosure in NameServer", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/93" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The NameServer in SAP TREX 7.10 Revision 63 allows remote attackers to obtain sensitive TNS information via an unspecified query, aka SAP Security Note 2234226." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-09-27T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://onapsis.com/research/security-advisories/sap-trex-tns-information-disclosure-nameserver" }, { "tags": [ "x_refsource_MISC" ], "url": "http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review" }, { "tags": [ "x_refsource_MISC" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/03/Layer-Seven-Security_SAP-Security-Notes_February-2016.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-033: SAP TREX TNS Information Disclosure in NameServer", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/93" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6146", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NameServer in SAP TREX 7.10 Revision 63 allows remote attackers to obtain sensitive TNS information via an unspecified query, aka SAP Security Note 2234226." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://onapsis.com/research/security-advisories/sap-trex-tns-information-disclosure-nameserver", "refsource": "MISC", "url": "http://onapsis.com/research/security-advisories/sap-trex-tns-information-disclosure-nameserver" }, { "name": "http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review", "refsource": "MISC", "url": "http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review" }, { "name": "https://layersevensecurity.com/wp-content/uploads/2016/03/Layer-Seven-Security_SAP-Security-Notes_February-2016.pdf", "refsource": "MISC", "url": "https://layersevensecurity.com/wp-content/uploads/2016/03/Layer-Seven-Security_SAP-Security-Notes_February-2016.pdf" }, { "name": "http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html" }, { "name": "20160819 Onapsis Security Advisory ONAPSIS-2016-033: SAP TREX TNS Information Disclosure in NameServer", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Aug/93" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6146", "datePublished": "2016-09-27T15:00:00", "dateReserved": "2016-07-01T00:00:00", "dateUpdated": "2024-08-06T01:22:20.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-11459
Vulnerability from cvelistv5
Published
2017-07-25 18:00
Modified
2024-08-05 18:12
Severity ?
EPSS score ?
Summary
SAP TREX 7.10 allows remote attackers to (1) read arbitrary files via an fget command or (2) write to arbitrary files and consequently execute arbitrary code via an fdir command, aka SAP Security Note 2419592.
References
▼ | URL | Tags |
---|---|---|
https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:12:39.837Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-11T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP TREX 7.10 allows remote attackers to (1) read arbitrary files via an fget command or (2) write to arbitrary files and consequently execute arbitrary code via an fdir command, aka SAP Security Note 2419592." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-10T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-11459", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP TREX 7.10 allows remote attackers to (1) read arbitrary files via an fget command or (2) write to arbitrary files and consequently execute arbitrary code via an fdir command, aka SAP Security Note 2419592." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/", "refsource": "MISC", "url": "https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-11459", "datePublished": "2017-07-25T18:00:00", "dateReserved": "2017-07-19T00:00:00", "dateUpdated": "2024-08-05T18:12:39.837Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2016-09-27 15:59
Modified
2024-11-21 02:55
Severity ?
Summary
An unspecified function in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands via unknown vectors, aka SAP Security Note 2203591.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution | Permissions Required, Third Party Advisory | |
cve@mitre.org | http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://seclists.org/fulldisclosure/2016/Aug/113 | Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2016/Aug/85 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2016/Aug/113 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2016/Aug/85 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:trex:7.10:revision_63:*:*:*:*:*:*", "matchCriteriaId": "9F3A9BC2-1A94-433B-B3B2-DB4CB2839195", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unspecified function in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands via unknown vectors, aka SAP Security Note 2203591." }, { "lang": "es", "value": "Una funci\u00f3n no especificada en SAP TREX 7.10 Revision 63 permite a atacantes remotos ejecutar comandos SO arbitrarios a trav\u00e9s de vectores desconocidos, vulnerabilidad tambi\u00e9n conocida como SAP Security Note 2203591." } ], "id": "CVE-2016-6137", "lastModified": "2024-11-21T02:55:31.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-09-27T15:59:03.173", "references": [ { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/113" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://onapsis.com/research/security-advisories/sap-trex-remote-command-execution" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/138436/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/85" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-05 14:59
Modified
2024-11-21 02:55
Severity ?
Summary
An unspecified interface in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands with SIDadm privileges via unspecified vectors, aka SAP Security Note 2234226.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:trex:7.10:revision_63:*:*:*:*:*:*", "matchCriteriaId": "9F3A9BC2-1A94-433B-B3B2-DB4CB2839195", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unspecified interface in SAP TREX 7.10 Revision 63 allows remote attackers to execute arbitrary OS commands with SIDadm privileges via unspecified vectors, aka SAP Security Note 2234226." }, { "lang": "es", "value": "Una interface no especificada en SAP TREX 7.10 Revision 63 permite a atacantes remotos ejecutar comandos OS arbitrarios con privilegios SIDadm a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como SAP Security Note 2234226." } ], "id": "CVE-2016-6147", "lastModified": "2024-11-21T02:55:32.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:18.457", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/94" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92066" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-february-2016" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-command-execution-0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/138446/SAP-TREX-7.10-Revision-63-Remote-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-february-2016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-command-execution-0" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-05 14:59
Modified
2024-11-21 02:55
Severity ?
Summary
SAP TREX 7.10 Revision 63 allows remote attackers to write to arbitrary files via vectors related to RFC-Gateway, aka SAP Security Note 2203591.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:trex:7.10:revision_63:*:*:*:*:*:*", "matchCriteriaId": "9F3A9BC2-1A94-433B-B3B2-DB4CB2839195", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP TREX 7.10 Revision 63 allows remote attackers to write to arbitrary files via vectors related to RFC-Gateway, aka SAP Security Note 2203591." }, { "lang": "es", "value": "SAP TREX 7.10 Revision 63 permite a atacantes remotos escribir a archivos arbitrarios a trav\u00e9s de vectores relacionados con RFC-Gateway, tambi\u00e9n conocido como SAP Security Note 2203591." } ], "id": "CVE-2016-6140", "lastModified": "2024-11-21T02:55:31.937", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:13.830", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/88" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92069" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-arbitrary-file-write" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/138439/SAP-TREX-7.10-Revision-63-Arbitrary-File-Write.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/88" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-arbitrary-file-write" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-05 14:59
Modified
2024-11-21 02:55
Severity ?
Summary
Directory traversal vulnerability in SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:trex:7.10:revision_63:*:*:*:*:*:*", "matchCriteriaId": "9F3A9BC2-1A94-433B-B3B2-DB4CB2839195", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en SAP TREX 7.10 Revision 63 permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como SAP Security Note 2203591." } ], "id": "CVE-2016-6138", "lastModified": "2024-11-21T02:55:31.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:11.437", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/114" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/86" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92060" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "source": "cve@mitre.org", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-directory-traversal" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/138437/SAP-TREX-7.10-Revision-63-Directory-Traversal.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://layersevensecurity.com/wp-content/uploads/2015/11/Layer-Seven-Security_SAP-Security-Notes_October-2015.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-directory-traversal" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-07-25 18:29
Modified
2024-11-21 03:07
Severity ?
Summary
SAP TREX 7.10 allows remote attackers to (1) read arbitrary files via an fget command or (2) write to arbitrary files and consequently execute arbitrary code via an fdir command, aka SAP Security Note 2419592.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:trex:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "480E51C3-A029-44F2-9874-B9B551A225CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP TREX 7.10 allows remote attackers to (1) read arbitrary files via an fget command or (2) write to arbitrary files and consequently execute arbitrary code via an fdir command, aka SAP Security Note 2419592." }, { "lang": "es", "value": "SAP TREX versi\u00f3n 7.10 permite a los atacantes remotos (1) leer archivos arbitrarios mediante un comando fget o (2) escribir en archivos arbitrarios y, en consecuencia, ejecutar c\u00f3digo arbitrario mediante un comando fdir, tambi\u00e9n se conoce como Nota de Seguridad de SAP 2419592." } ], "id": "CVE-2017-11459", "lastModified": "2024-11-21T03:07:49.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-07-25T18:29:01.167", "references": [ { "source": "cve@mitre.org", "url": "https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://erpscan.io/advisories/erpscan-17-019-sap-trex-rce/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-11 21:59
Modified
2024-11-21 03:32
Severity ?
Summary
A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/97567 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97567 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:trex:-:*:*:*:*:*:*:*", "matchCriteriaId": "A835C826-B2FE-4018-A8C7-B61C35272EDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592." }, { "lang": "es", "value": "Existe una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en SAP TREX / Business Warehouse Accelerator (BWA). La respuesta del proveedor es SAP Security Note 2419592." } ], "id": "CVE-2017-7691", "lastModified": "2024-11-21T03:32:28.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-11T21:59:00.180", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97567" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-09-27 15:59
Modified
2024-11-21 02:55
Severity ?
Summary
The NameServer in SAP TREX 7.10 Revision 63 allows remote attackers to obtain sensitive TNS information via an unspecified query, aka SAP Security Note 2234226.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:trex:7.10:revision_63:*:*:*:*:*:*", "matchCriteriaId": "9F3A9BC2-1A94-433B-B3B2-DB4CB2839195", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NameServer in SAP TREX 7.10 Revision 63 allows remote attackers to obtain sensitive TNS information via an unspecified query, aka SAP Security Note 2234226." }, { "lang": "es", "value": "El NameServer in SAP TREX 7.10 Revision 63 permite a atacantes remotos obtener informaci\u00f3n TNS sensible a trav\u00e9s de una consulta no especificada, vulnerabilidad tambi\u00e9n conocida como SAP Security Note 2234226." } ], "id": "CVE-2016-6146", "lastModified": "2024-11-21T02:55:32.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-09-27T15:59:04.737", "references": [ { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://onapsis.com/research/security-advisories/sap-trex-tns-information-disclosure-nameserver" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/93" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/03/Layer-Seven-Security_SAP-Security-Notes_February-2016.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://onapsis.com/research/security-advisories/sap-trex-tns-information-disclosure-nameserver" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Aug/93" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://layersevensecurity.com/wp-content/uploads/2016/03/Layer-Seven-Security_SAP-Security-Notes_February-2016.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-05 14:59
Modified
2024-11-21 02:55
Severity ?
Summary
SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:trex:7.10:revision_63:*:*:*:*:*:*", "matchCriteriaId": "9F3A9BC2-1A94-433B-B3B2-DB4CB2839195", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP TREX 7.10 Revision 63 allows remote attackers to read arbitrary files via unspecified vectors, aka SAP Security Note 2203591." }, { "lang": "es", "value": "SAP TREX 7.10 Revision 63 permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como SAP Security Note 2203591." } ], "id": "CVE-2016-6139", "lastModified": "2024-11-21T02:55:31.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:12.737", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/115" }, { "source": "cve@mitre.org", "url": "http://seclists.org/fulldisclosure/2016/Aug/87" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92063" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-file-read" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/138438/SAP-TREX-7.10-Revision-63-Remote-File-Read.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2016/Aug/87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-october-2015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://www.onapsis.com/research/security-advisories/sap-trex-remote-file-read" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201704-1573
Vulnerability from variot
A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592. Successful exploits may allow an attacker to inject and run arbitrary code or obtain sensitive information that may aid in further attacks. Failed exploit attempts may result in a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-1573", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "trex", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": null }, { "model": "trex", "scope": "eq", "trust": 0.8, "vendor": "sap", "version": "business warehouse accelerator" }, { "model": "netweaver search and classification", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "netweaver", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "business warehouse accelerator", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" } ], "sources": [ { "db": "BID", "id": "97567" }, { "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "db": "NVD", "id": "CVE-2017-7691" }, { "db": "CNNVD", "id": "CNNVD-201704-581" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sap:trex:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-7691" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "97567" } ], "trust": 0.3 }, "cve": "CVE-2017-7691", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-7691", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-7691", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-7691", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201704-581", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "db": "NVD", "id": "CVE-2017-7691" }, { "db": "CNNVD", "id": "CNNVD-201704-581" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A code injection vulnerability exists in SAP TREX / Business Warehouse Accelerator (BWA). The vendor response is SAP Security Note 2419592. \nSuccessful exploits may allow an attacker to inject and run arbitrary code or obtain sensitive information that may aid in further attacks. Failed exploit attempts may result in a denial-of-service condition", "sources": [ { "db": "NVD", "id": "CVE-2017-7691" }, { "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "db": "BID", "id": "97567" } ], "trust": 1.89 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-7691", "trust": 2.7 }, { "db": "BID", "id": "97567", "trust": 1.3 }, { "db": "JVNDB", "id": "JVNDB-2017-003092", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201704-581", "trust": 0.6 } ], "sources": [ { "db": "BID", "id": "97567" }, { "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "db": "NVD", "id": "CVE-2017-7691" }, { "db": "CNNVD", "id": "CNNVD-201704-581" } ] }, "id": "VAR-201704-1573", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.27111164 }, "last_update_date": "2023-12-18T12:51:19.664000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP Security Patch Day - April 2017 (2419592)", "trust": 0.8, "url": "https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/" }, { "title": "SAP TREX/Business Warehouse Accelerator Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=70172" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "db": "CNNVD", "id": "CNNVD-201704-581" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "db": "NVD", "id": "CVE-2017-7691" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://blogs.sap.com/2017/04/11/sap-security-patch-day-april-2017/" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/97567" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7691" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7691" }, { "trust": 0.3, "url": "http://www.sap.com/" }, { "trust": 0.3, "url": "https://service.sap.com/sap/support/notes/2419592" } ], "sources": [ { "db": "BID", "id": "97567" }, { "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "db": "NVD", "id": "CVE-2017-7691" }, { "db": "CNNVD", "id": "CNNVD-201704-581" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "97567" }, { "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "db": "NVD", "id": "CVE-2017-7691" }, { "db": "CNNVD", "id": "CNNVD-201704-581" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-11T00:00:00", "db": "BID", "id": "97567" }, { "date": "2017-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "date": "2017-04-11T21:59:00.180000", "db": "NVD", "id": "CVE-2017-7691" }, { "date": "2017-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-581" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-18T00:04:00", "db": "BID", "id": "97567" }, { "date": "2017-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003092" }, { "date": "2017-04-17T19:06:15.527000", "db": "NVD", "id": "CVE-2017-7691" }, { "date": "2017-05-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-581" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-581" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP TREX / Business Warehouse Accelerator Code injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003092" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-581" } ], "trust": 0.6 } }