SAP

Hana

37 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Published 09.03.2021 15:15:14
  • Last modified 21.11.2024 05:48:27

LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind.

  • EPSS 0.03%
  • Published 10.09.2019 17:15:11
  • Last modified 21.11.2024 04:16:44

The administrator of SAP HANA database, before versions 1.0 and 2.0, can misuse HANA to execute commands with operating system "root" privileges.

  • EPSS 0.04%
  • Published 10.04.2019 21:29:01
  • Last modified 21.11.2024 04:16:38

SLD Registration in SAP HANA (fixed in versions 1.0, 2.0) does not sufficiently validate an XML document accepted from an untrusted source. The attacker can call SLDREG with an XML file containing a reference to an XML External Entity (XXE). This can...

  • EPSS 0.24%
  • Published 11.12.2018 22:29:00
  • Last modified 21.11.2024 04:03:55

The security audit log of SAP HANA, versions 1.0 and 2.0, does not log SELECT events if these events are part of a statement with the syntax CREATE TABLE <table_name> AS SELECT.

  • EPSS 0.61%
  • Published 11.09.2018 15:29:02
  • Last modified 21.11.2024 04:03:51

SAP HANA (versions 1.0 and 2.0) Extended Application Services classic model OData parser does not sufficiently validate XML. By exploiting, an unauthorized hacker can cause the database server to crash.

  • EPSS 0.27%
  • Published 14.03.2018 19:29:00
  • Last modified 21.11.2024 04:03:45

In systems using the optional capture & replay functionality of SAP HANA, 1.00 and 2.00, (see SAP Note 2362820 for more information about capture & replay), user credentials may be stored in clear text in the indexserver trace files of the control sy...

  • EPSS 1.01%
  • Published 14.02.2018 12:29:00
  • Last modified 21.11.2024 04:03:41

Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8...

  • EPSS 0.28%
  • Published 09.01.2018 15:29:00
  • Last modified 21.11.2024 04:03:40

A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform's hostname.

  • EPSS 6.55%
  • Published 13.04.2017 14:59:01
  • Last modified 20.04.2025 01:37:25

SAP HANA DB 1.00.73.00.389160 allows remote attackers to execute arbitrary code via vectors involving the audit logs, aka SAP Security Note 2170806.

Exploit
  • EPSS 1.22%
  • Published 26.09.2016 16:59:02
  • Last modified 12.04.2025 10:46:40

SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote attackers to inject arbitrary audit trail fields into the SYSLOG via vectors related to the SQL protocol, aka SAP Security Note 2197459.