exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Ertunga Arsal

First Active2007-06-07
Last Active2016-12-07
PwC ACE Software For SAP Security 8.10.304 ABAP Injection
Posted Dec 7, 2016
Authored by Ertunga Arsal, Mert Suoglu | Site esnc.de

PwC ACE software has a remotely exploitable security vulnerability which allows injection and execution of malicious ABAP code on the remote SAP system. Version 8.10.304 is affected.

tags | advisory, remote
advisories | CVE-2016-9832
SHA-256 | 09d0145e8338540901d89d889ba9cd283557db57962fdcd684e04dc0bbc61648
SAP GRC Bypass / Privilege Escalation / Program Execution
Posted Nov 12, 2014
Authored by Ertunga Arsal, Mert Suoglu | Site esnc.de

SAP Governance, Risk and Compliance (SAP GRC) suffers from SoD bypass, privilege escalation, and remote arbitrary program execution vulnerabilities.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2013-3678
SHA-256 | 2c6f6dd2ccedd0df4f801c917ff9f40ee8c504126cec43a0f77af7dde206d446
SAP ERP Remote Code Injection
Posted May 7, 2013
Authored by Ertunga Arsal | Site esnc.de

SAP ERP Central Component PS-IS suffers from a remote code injection vulnerability.

tags | advisory, remote
advisories | CVE-2013-3244
SHA-256 | 5e58652bd4084d45a345426470327c91caa6fc06378fffda9da820fa86d98247
SAP NetWeaver Remote ABAP Code Injection
Posted Apr 24, 2013
Authored by Ertunga Arsal | Site esnc.de

A SAP NetWeaver vulnerability allows injection of ABAP code. In SAP security, this is the equivalent of getting an ultra-reliable ring 0 exploit which works through the network and never crashes. By exploiting this vulnerability an attacker can e.g. inject code which saves the passwords of all connecting SAP GUI users in a remote file, steal or change sensitive data such as HR salary information, execute bank transactions and transfer money, or simply plant an SAP backdoor for accessing the system later. The attacker can also manipulate or corrupt ABAP programs shipped by SAP and make the system inoperable.

tags | advisory, remote
advisories | CVE-2013-3243
SHA-256 | bef5435dd9e71bc842aef59db42966ef03ac40124905e2ccd226ca1a86276d90
SAP BASIS Communication Services Command Execution
Posted Apr 16, 2013
Authored by Ertunga Arsal | Site esnc.de

SAP Basis Components versions 4.6B through 7.30 suffer from a remote command injection vulnerability.

tags | advisory, remote
advisories | CVE-2013-3063
SHA-256 | 439e261026af63ba9c8aeee51164c2ae9e2259c65267679fcd1b65b7fa4df04f
SAP Production Planning / Control Privilege Escalation
Posted Apr 16, 2013
Authored by Ertunga Arsal, Mert Suoglu | Site esnc.de

SAP Production Planning and Control suffers from a privilege escalation vulnerability. This vulnerability allows bypassing authority checks that exist before executing a transaction. A transaction in SAP terminology is the execution of a program. By exploiting this vulnerability, an attacker can also control the transaction to be executed, allowing it to obtain critical rights in the system and bypassing certain segregation of duties (SoD) restrictions.

tags | advisory
advisories | CVE-2013-3062
SHA-256 | eff7e22f57554cfb6fb76dc4a0134bc770589d4294f8621e081e553afee5d7da
SAP Healthcare Industry Solution Privilege Escalation
Posted Apr 16, 2013
Authored by Ertunga Arsal | Site esnc.de

This vulnerability allows bypassing authority checks that exist before executing a transaction. A transaction in SAP terminology is the execution of a program. By exploiting this vulnerability, an attacker can also control the transaction to be executed, allowing it to obtain critical rights in the system and bypassing certain segregation of duties (SoD) restrictions. Although this vulnerability is found in the SAP industry solution for healthcare, the functionality is also present in the SAP ERP central component (ECC 6). Thus, customers in other industries are also affected.

tags | advisory
advisories | CVE-2013-3061
SHA-256 | 04068b72f2c992a2fd3f3c6c9328f3a8d53414cded64945a2d57f759d3167747
SYM07-012.txt
Posted Jun 7, 2007
Authored by Ertunga Arsal | Site symantec.com

Symantec Security Advisory - Files created by a Reporting Server may be accessible to an unauthorized user.

tags | advisory
advisories | CVE-2007-3021
SHA-256 | 589ba56f401be09e9a8f35071b6a6e3ccaf8fdb6e6a9237a688e8a8e046e7299
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close