The HANA ICM process in SAP HANA allows remote attackers to obtain sensitive information via a malformed HTTP GET request
Reporter | Title | Published | Views | Family All 3 |
---|---|---|---|---|
![]() | CVE-2014-2749 | 10 Apr 201415:00 | – | cvelist |
![]() | CVE-2014-2749 | 10 Apr 201420:55 | – | nvd |
![]() | Cross site request forgery (csrf) | 10 Apr 201420:55 | – | prion |
Source | Link |
---|---|
exchange | www.exchange.xforce.ibmcloud.com/vulnerabilities/92325 |
securityfocus | www.securityfocus.com/bid/66675 |
onapsis | www.onapsis.com/research-advisories.php |
service | www.service.sap.com/sap/support/notes/1914778 |
secunia | www.secunia.com/advisories/57443 |
onapsis | www.onapsis.com/get.php |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo