- EPSS 0.25%
- Veröffentlicht 29.05.2015 15:59:14
- Zuletzt bearbeitet 12.04.2025 10:46:40
The grant.xsfunc application in testApps/grantAccess/ in the XS Engine in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to spoof log entries via a crafted request, aka SAP Security Note 2109818.
CVE-2015-2072
- EPSS 0.26%
- Veröffentlicht 27.02.2015 15:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA 73 (1.00.73.00.389160) and HANA Developer Edition 80 (1.00.80.00.391861) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) ide/core/plugins/edi...
CVE-2014-8587
- EPSS 0.59%
- Veröffentlicht 04.11.2014 15:55:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
SAPCRYPTOLIB before 5.555.38, SAPSECULIB, and CommonCryptoLib before 8.4.30, as used in SAP NetWeaver AS for ABAP and SAP HANA, allows remote attackers to spoof Digital Signature Algorithm (DSA) signatures via unspecified vectors.
CVE-2014-8314
- EPSS 0.43%
- Veröffentlicht 16.10.2014 19:55:20
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA Developer Edition Revision 70 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) epm/admin/DataGen.xsjs or (2) epm/services/multiply.xsjs in the...
- EPSS 0.8%
- Veröffentlicht 16.10.2014 19:55:20
- Zuletzt bearbeitet 12.04.2025 10:46:40
Eval injection in ide/core/base/server/net.xsjs in the Developer Workbench in SAP HANA allows remote attackers to execute arbitrary XSJX code via unspecified vectors.
CVE-2014-5172
- EPSS 0.53%
- Veröffentlicht 31.07.2014 14:55:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple cross-site scripting (XSS) vulnerabilities in the XS Administration Tools in SAP HANA allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
- EPSS 0.52%
- Veröffentlicht 10.04.2014 20:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
The HANA ICM process in SAP HANA allows remote attackers to obtain the platform version, host name, instance number, and possibly other sensitive information via a malformed HTTP GET request.