exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Mathieu Geli

First Active2016-01-27
Last Active2017-03-21
SAP NetWeaver UMEADMIN 7.50 Directory Creation
Posted Mar 21, 2017
Authored by Mathieu Geli

SAP NetWeaver UMEADMIN versions 7.00 through 7.50 suffer from a flaw where an authenticated user, via web administration, can trigger directory creation anywhere where the SAP OS user has access.

tags | exploit, web
SHA-256 | 577200dbf4a5c8490c6147ad8f89d5b575f031125524538d758210005cb31e60
SAP NetWeaver AS JAVA 7.5 Directory Traversal
Posted Nov 19, 2016
Authored by Mathieu Geli

SAP NetWeaver AS JAVA versions 7.1 through 7.5 suffer from a directory traversal vulnerability.

tags | exploit, java
SHA-256 | 62cc4d036331589bf67b67e77af5807e4474a073efb99c6620b5006901f5230b
SAP EP-RUNTIME 7.5 Denial Of Service
Posted Oct 17, 2016
Authored by Mathieu Geli

SAP EP-RUNTIME version 7.5 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3f0975ddf76e930f8e4b83447cfd991b8747cc460b16cad70cfad5fd2608ce72
SAP HANA 102.02 Denial Of Service
Posted Apr 19, 2016
Authored by Mathieu Geli

SAP HANA version 102.02 suffers from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 5fccc7675d88d83dae2c3a0c0c65e2fb0a98ab8777842e235044812b9b499f18
SAP HANA 1.00.095.00.1429086950 Log Injection
Posted Apr 15, 2016
Authored by Mathieu Geli

Anonymous attackers can use a special HTTP request to inject logs in the xsengine trace file without size restriction. The vulnerability is triggered when the username sent to the /sap/hana/xs/debugger/grantAccess.xscfunc page is longer than 256 characters.

tags | advisory, web
SHA-256 | c8c5dd5a2c2a55cdafe1f8d473df9812f164b0f46f07d0a934fb5fc0b3a066f0
SAP PCo 2.2 / 2.3 / 15.0 / 15.1 Denial Of Service
Posted Feb 16, 2016
Authored by Mathieu Geli

SAP PCo versions 2.2, 2.3, 15.0, and 15.1 suffer from a denial of service vulnerability.

tags | advisory, denial of service
advisories | CVE-2015-8330
SHA-256 | 39b8bca8d12d613256ed16b6471e91e8cda9378908f629e973648bcbe9a349be
SAP MII 12.2 / 14.0 / 15.0 Cryptography Issues
Posted Feb 15, 2016
Authored by Mathieu Geli

SAP MII versions 12.2, 14.0, and 15.0 allow Base64 and DES as an encryption algorithm.

tags | advisory
advisories | CVE-2015-8329
SHA-256 | 8d8406e9a99282c000153684f4edfedc8fa3af9e5227108e35ed09b9acca615e
SAP HANA hdbindexserver Memory Corruption
Posted Jan 27, 2016
Authored by Mathieu Geli

A buffer overflow vulnerability exists in SAP HANA interface. If an attacker has a network access to the SQL interface or the SAP HANA Extended Application Services interface of an SAP HANA system, the vulnerability enables the attacker to inject code into the working memory that is subsequently executed by the application. It can also be used to cause a general fault in the product causing the product to terminate.

tags | exploit, overflow
SHA-256 | 4a3217c857218fca063182a533106637a286820d37a2c8dbd3fe6da700dfe2ad
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close