Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2015-11-09T00:00:00", "descriptions": [{"lang": "en", "value": "SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2015-11-10T16:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "20151109 [Onapsis Security Advisory 2015-024-040] SAP HANA TrexNet Vulnerabilities", "tags": ["mailing-list", "x_refsource_FULLDISC"], "url": "http://seclists.org/fulldisclosure/2015/Nov/36"}, {"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html"}, {"tags": ["x_refsource_MISC"], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7828", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "20151109 [Onapsis Security Advisory 2015-024-040] SAP HANA TrexNet Vulnerabilities", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Nov/36"}, {"name": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html"}, {"name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition", "refsource": "MISC", "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-06T07:59:00.367Z"}, "title": "CVE Program Container", "references": [{"name": "20151109 [Onapsis Security Advisory 2015-024-040] SAP HANA TrexNet Vulnerabilities", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"], "url": "http://seclists.org/fulldisclosure/2015/Nov/36"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7828", "datePublished": "2015-11-10T16:00:00", "dateReserved": "2015-10-14T00:00:00", "dateUpdated": "2024-08-06T07:59:00.367Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}