Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap hana 1.00 vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2018-2362
A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform's hostname.
Sap Hana 1.00
Sap Hana 2.00
5.3
CVSSv3
CVE-2018-2369
Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated malicious user to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server pro...
Sap Hana 1.00
Sap Hana 2.00
8.4
CVSSv3
CVE-2018-2402
In systems using the optional capture & replay functionality of SAP HANA, 1.00 and 2.00, (see SAP Note 2362820 for more information about capture & replay), user credentials may be stored in clear text in the indexserver trace files of the control system. An attacker with...
Sap Hana 1.00
Sap Hana 2.00
7.5
CVSSv3
CVE-2019-0350
SAP HANA Database, versions 1.0, 2.0, allows an unauthorized malicious user to send a malformed connection request, which crashes the indexserver of an SAP HANA instance, leading to Denial of Service
Sap Hana Database 2.00
Sap Hana Database 1.00
8.3
CVSSv3
CVE-2017-8914
sinopia, as used in SAP HANA XS 1.00 and 2.00, allows remote malicious users to hijack npm packages or host arbitrary files by leveraging an insecure user creation policy, aka SAP Security Note 2407694.
Sap Hana Xs 2.00
Sap Hana Xs 1.00
7.5
CVSSv3
CVE-2017-8915
sinopia, as used in SAP HANA XS 1.00 and 2.00, allows remote malicious users to cause a denial of service (assertion failure and service crash) by pushing a package with a filename containing a $ (dollar sign) or % (percent) character, aka SAP Security Note 2407694.
Sap Hana Xs 2.00
Sap Hana Xs 1.00
6.5
CVSSv3
CVE-2021-21474
SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and wi...
Sap Hana Database 2.00
Sap Hana Database 1.00
5.3
CVSSv3
CVE-2017-16687
The user self-service tools of SAP HANA extended application services, classic user self-service, a part of SAP HANA Database versions 1.00 and 2.00, can be misused to enumerate valid and invalid user accounts. An unauthenticated user could use the error messages to determine if ...
Sap Hana Database 2.00
Sap Hana Database 1.00
7.5
CVSSv3
CVE-2018-2424
SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Jav...
Sap Ui 7.51
Sap Ui 7.52
Sap Ui5 Java 7.30
Sap Ui5 Java 7.31
Sap Ui 2.0
Sap Ui 7.50
Sap Ui5 Java 7.40
Sap Ui5 1.00
Sap Hana Database 2.00
Sap Ui 7.40
Sap Ui5 Java 7.50
Sap Hana Database 1.00
NA
CVE-2015-7828
SAP HANA Database 1.00 SPS10 and previous versions do not require authentication, which allows remote malicious users to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (...
Sap Hana
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started