exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Mathieu Geli

First Active2016-01-27
Last Active2017-03-21
SAP NetWeaver UMEADMIN 7.50 Directory Creation
Posted Mar 21, 2017
Authored by Mathieu Geli

SAP NetWeaver UMEADMIN versions 7.00 through 7.50 suffer from a flaw where an authenticated user, via web administration, can trigger directory creation anywhere where the SAP OS user has access.

tags | exploit, web
SHA-256 | 577200dbf4a5c8490c6147ad8f89d5b575f031125524538d758210005cb31e60
SAP NetWeaver AS JAVA 7.5 Directory Traversal
Posted Nov 19, 2016
Authored by Mathieu Geli

SAP NetWeaver AS JAVA versions 7.1 through 7.5 suffer from a directory traversal vulnerability.

tags | exploit, java
SHA-256 | 62cc4d036331589bf67b67e77af5807e4474a073efb99c6620b5006901f5230b
SAP EP-RUNTIME 7.5 Denial Of Service
Posted Oct 17, 2016
Authored by Mathieu Geli

SAP EP-RUNTIME version 7.5 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3f0975ddf76e930f8e4b83447cfd991b8747cc460b16cad70cfad5fd2608ce72
SAP HANA 102.02 Denial Of Service
Posted Apr 19, 2016
Authored by Mathieu Geli

SAP HANA version 102.02 suffers from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 5fccc7675d88d83dae2c3a0c0c65e2fb0a98ab8777842e235044812b9b499f18
SAP HANA 1.00.095.00.1429086950 Log Injection
Posted Apr 15, 2016
Authored by Mathieu Geli

Anonymous attackers can use a special HTTP request to inject logs in the xsengine trace file without size restriction. The vulnerability is triggered when the username sent to the /sap/hana/xs/debugger/grantAccess.xscfunc page is longer than 256 characters.

tags | advisory, web
SHA-256 | c8c5dd5a2c2a55cdafe1f8d473df9812f164b0f46f07d0a934fb5fc0b3a066f0
SAP PCo 2.2 / 2.3 / 15.0 / 15.1 Denial Of Service
Posted Feb 16, 2016
Authored by Mathieu Geli

SAP PCo versions 2.2, 2.3, 15.0, and 15.1 suffer from a denial of service vulnerability.

tags | advisory, denial of service
advisories | CVE-2015-8330
SHA-256 | 39b8bca8d12d613256ed16b6471e91e8cda9378908f629e973648bcbe9a349be
SAP MII 12.2 / 14.0 / 15.0 Cryptography Issues
Posted Feb 15, 2016
Authored by Mathieu Geli

SAP MII versions 12.2, 14.0, and 15.0 allow Base64 and DES as an encryption algorithm.

tags | advisory
advisories | CVE-2015-8329
SHA-256 | 8d8406e9a99282c000153684f4edfedc8fa3af9e5227108e35ed09b9acca615e
SAP HANA hdbindexserver Memory Corruption
Posted Jan 27, 2016
Authored by Mathieu Geli

A buffer overflow vulnerability exists in SAP HANA interface. If an attacker has a network access to the SQL interface or the SAP HANA Extended Application Services interface of an SAP HANA system, the vulnerability enables the attacker to inject code into the working memory that is subsequently executed by the application. It can also be used to cause a general fault in the product causing the product to terminate.

tags | exploit, overflow
SHA-256 | 4a3217c857218fca063182a533106637a286820d37a2c8dbd3fe6da700dfe2ad
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    467 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close