Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Adaptive_server_enterprise
(Sap)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 14 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-05-12 | CVE-2020-6253 | Under certain conditions, SAP Adaptive Server Enterprise (Web Services), versions 15.7, 16.0, allows an authenticated user to execute crafted database queries to elevate their privileges, modify database objects, or execute commands they are not otherwise authorized to execute, leading to SQL Injection. | Adaptive_server_enterprise | 7.2 | ||
2020-05-12 | CVE-2020-6259 | Under certain conditions SAP Adaptive Server Enterprise, versions 15.7, 16.0, allows an attacker to access information which would otherwise be restricted leading to Missing Authorization Check. | Adaptive_server_enterprise | 6.5 | ||
2020-08-12 | CVE-2020-6295 | Under certain conditions the SAP Adaptive Server Enterprise, version 16.0, allows an attacker to access encrypted sensitive and confidential information through publicly readable installation log files leading to a compromise of the installed Cockpit. This compromise could enable the attacker to view, modify and/or make unavailable any data associated with the Cockpit, leading to Information Disclosure. | Adaptive_server_enterprise | 7.8 | ||
2020-11-30 | CVE-2020-6317 | In certain situations, an attacker with regular user credentials and local access to an ASE cockpit installation can access sensitive information which appears in the installation log files. This information although sensitive is of limited utility and cannot be used to further access, modify or render unavailable any other information in the cockpit or system. This affects SAP Adaptive Server Enterprise, Versions - 15.7, 16.0. | Adaptive_server_enterprise | 3.5 | ||
2022-02-09 | CVE-2022-22528 | SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries. | Adaptive_server_enterprise | 7.8 | ||
2022-06-14 | CVE-2022-31594 | A highly privileged user can exploit SUID-root program to escalate his privileges to root on a local Unix system. | Adaptive_server_enterprise | 6.7 | ||
2022-06-14 | CVE-2022-31595 | SAP Financial Consolidation - version 1010,?does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. | Adaptive_server_enterprise | 8.8 | ||
2018-10-09 | CVE-2018-2469 | Under certain conditions SAP Adaptive Server Enterprise (ASE), versions 15.7 and 16.0, allows an attacker to access information which would otherwise be restricted. | Adaptive_server_enterprise | 7.5 | ||
2018-10-09 | CVE-2018-2468 | Under certain conditions the backup server in SAP Adaptive Server Enterprise (ASE), versions 15.7 and 16.0, allows an attacker to access information which would otherwise be restricted. | Adaptive_server_enterprise | 7.5 | ||
2018-09-11 | CVE-2018-2457 | Under certain conditions SAP Adaptive Server Enterprise, version 16.0, allows some privileged users to access information which would otherwise be restricted. | Adaptive_server_enterprise | 6.5 |