Lucene search

K
SapHana Database2.00

5 matches found

CVE
CVE
added 2017/12/12 2:29 p.m.41 views

CVE-2017-16687

The user self-service tools of SAP HANA extended application services, classic user self-service, a part of SAP HANA Database versions 1.00 and 2.00, can be misused to enumerate valid and invalid user accounts. An unauthenticated user could use the error messages to determine if a given username is...

5.3CVSS5.3AI score0.00877EPSS
CVE
CVE
added 2021/02/09 9:15 p.m.39 views

CVE-2021-21474

SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and without invalidating ...

6.5CVSS6.1AI score0.00152EPSS
CVE
CVE
added 2019/11/04 3:15 p.m.36 views

CVE-2019-0350

SAP HANA Database, versions 1.0, 2.0, allows an unauthorized attacker to send a malformed connection request, which crashes the indexserver of an SAP HANA instance, leading to Denial of Service

7.5CVSS7.4AI score0.00536EPSS
CVE
CVE
added 2018/06/12 3:29 p.m.34 views

CVE-2018-2424

SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40...

9.8CVSS7.5AI score0.00367EPSS
CVE
CVE
added 2020/12/09 5:15 p.m.32 views

CVE-2020-26834

SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML beare...

5.5CVSS5.5AI score0.0016EPSS