5 results (0.002 seconds)

CVSS: 9.3EPSS: 94%CPEs: 13EXPL: 2

Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. Desbordamiento de búfer basado en pila en el control ActiveX de EAI WebViewer3D (webviewer3d.dll) en SAP AG SAPgui versiones anteriores a v7.10 Patch Level 9 permite a atacantes remotos ejecutar código de su elección a través de un argumento largo del método SaveViewToSessionFile. • https://www.exploit-db.com/exploits/16575 https://www.exploit-db.com/exploits/32879 http://secunia.com/advisories/34559 http://www.kb.cert.org/vuls/id/985449 http://www.securityfocus.com/bid/34310 http://www.vupen.com/english/advisories/2009/0892 https://exchange.xforce.ibmcloud.com/vulnerabilities/49543 https://service.sap.com/sap/support/notes/1153794 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 3EXPL: 1

SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. SAPLPD 6.28 y anteriores incluidas en SAP GUI 7.10 y SAPSprint antes de 1018. permite a atacantes remotos provocar una denegación de servicio (caída) a través de un comando 0x53 LPD, lo que provoca que el servidor termine. • http://secunia.com/advisories/28786 http://secunia.com/advisories/28811 http://securityreason.com/securityalert/3619 http://www.securityfocus.com/archive/1/487508/100/0/threaded http://www.securityfocus.com/archive/1/487575/100/0/threaded http://www.securityfocus.com/bid/27613 http://www.securitytracker.com/id?1019300 http://www.vupen.com/english/advisories/2008/0409 http://www.vupen.com/english/advisories/2008/0438 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 83%CPEs: 3EXPL: 3

Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. Desbordamiento de búfer en SAPLPD 6.28 y anteriores incluidas en SAP GUI 7.10 y SAPSprint antes de 1018. Permite a atacantes remotos ejecutar código de su elección a través de argumentos largos a los comandos 1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04 y (5) 0x05 LPD. • https://www.exploit-db.com/exploits/16338 https://www.exploit-db.com/exploits/5079 http://secunia.com/advisories/28786 http://secunia.com/advisories/28811 http://securityreason.com/securityalert/3619 http://www.securityfocus.com/archive/1/487508/100/0/threaded http://www.securityfocus.com/archive/1/487575/100/0/threaded http://www.securityfocus.com/bid/27613 http://www.securitytracker.com/id?1019300 http://www.vupen.com/english/advisories/2008/0409 http://www.vupen.com • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an "unknown connection data" error. SAP GUI (Sapgui) 4.6D permite a atacantes remotos causar una denegación de servicio mediante una conexión a un puerto con un número alto, que genera un un error "conexión de datos desconocida". • http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html http://www.securityfocus.com/bid/3972 https://exchange.xforce.ibmcloud.com/vulnerabilities/8007 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does. La instalación por defecto de SAP R/3 46C/D permite a atacantes remotos saltarse bloqueos de cuentas usando la API RFC en lugar de SAPGUI para hacer ataques de fuerza bruta para averiguar la contraseña, lo cual no bloquea las cuentas como lo hace SAPGUI. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html http://www.securityfocus.com/archive/1/451378/100/0/threaded http://www.securityfocus.com/bid/7007 https://exchange.xforce.ibmcloud.com/vulnerabilities/11487 •