3 results (0.039 seconds)

CVSS: 9.3EPSS: 94%CPEs: 13EXPL: 2

Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. Desbordamiento de búfer basado en pila en el control ActiveX de EAI WebViewer3D (webviewer3d.dll) en SAP AG SAPgui versiones anteriores a v7.10 Patch Level 9 permite a atacantes remotos ejecutar código de su elección a través de un argumento largo del método SaveViewToSessionFile. • https://www.exploit-db.com/exploits/16575 https://www.exploit-db.com/exploits/32879 http://secunia.com/advisories/34559 http://www.kb.cert.org/vuls/id/985449 http://www.securityfocus.com/bid/34310 http://www.vupen.com/english/advisories/2009/0892 https://exchange.xforce.ibmcloud.com/vulnerabilities/49543 https://service.sap.com/sap/support/notes/1153794 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an "unknown connection data" error. SAP GUI (Sapgui) 4.6D permite a atacantes remotos causar una denegación de servicio mediante una conexión a un puerto con un número alto, que genera un un error "conexión de datos desconocida". • http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html http://www.securityfocus.com/bid/3972 https://exchange.xforce.ibmcloud.com/vulnerabilities/8007 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does. La instalación por defecto de SAP R/3 46C/D permite a atacantes remotos saltarse bloqueos de cuentas usando la API RFC en lugar de SAPGUI para hacer ataques de fuerza bruta para averiguar la contraseña, lo cual no bloquea las cuentas como lo hace SAPGUI. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html http://www.securityfocus.com/archive/1/451378/100/0/threaded http://www.securityfocus.com/bid/7007 https://exchange.xforce.ibmcloud.com/vulnerabilities/11487 •