Filtered by vendor Sap
Subscribe
Total
1426 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-1810 | 2 Linux, Sap | 2 Linux Kernel, Maxdb | 2017-08-08 | 4.4 MEDIUM | N/A |
Untrusted search path vulnerability in dbmsrv in SAP MaxDB 7.6.03.15 on Linux allows local users to gain privileges via a modified PATH environment variable. | |||||
CVE-2008-0307 | 1 Sap | 1 Maxdb | 2017-08-08 | 9.3 HIGH | N/A |
Integer signedness error in vserver in SAP MaxDB 7.6.0.37, and possibly other versions, allows remote attackers to execute arbitrary code via unknown vectors that trigger heap corruption. | |||||
CVE-2008-0306 | 1 Sap | 1 Maxdb | 2017-08-08 | 6.9 MEDIUM | N/A |
sdbstarter in SAP MaxDB 7.6.0.37, and possibly other versions, allows local users to execute arbitrary commands by using unspecified environment variables to modify configuration settings. | |||||
CVE-2007-6254 | 1 Sap | 1 Business Objects | 2017-08-08 | 9.3 HIGH | N/A |
Stack-based buffer overflow in the SAP Business Objects BusinessObjects RptViewerAX ActiveX control in RptViewerAX.dll in Business Objects 6.5 before CHF74 allows remote attackers to execute arbitrary code via unspecified vectors. | |||||
CVE-2007-4475 | 1 Sap | 1 Sapgui | 2017-07-29 | 9.3 HIGH | N/A |
Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. | |||||
CVE-2007-3624 | 1 Sap | 1 Sap Message Server | 2017-07-29 | 10.0 HIGH | N/A |
Heap-based buffer overflow in the Message HTTP Server in SAP Message Server allows remote attackers to execute arbitrary code via a long string in the group parameter to /msgserver/html/group. | |||||
CVE-2005-3636 | 1 Sap | 1 Sap Web Application Server | 2017-07-11 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in SAP Web Application Server (WAS) 6.10 allows remote attackers to inject arbitrary web script or HTML via Error Pages. | |||||
CVE-2005-3635 | 1 Sap | 1 Sap Web Application Server | 2017-07-11 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in SAP Web Application Server (WAS) 6.10 through 7.00 allow remote attackers to inject arbitrary web script or HTML via (1) the sap-syscmd in sap-syscmd and (2) the BspApplication field in the SYSTEM PUBLIC test application. | |||||
CVE-2005-3634 | 1 Sap | 1 Sap Web Application Server | 2017-07-11 | 5.0 MEDIUM | N/A |
frameset.htm in the BSP runtime in SAP Web Application Server (WAS) 6.10 through 7.00 allows remote attackers to log users out and redirect them to arbitrary web sites via a close command in the sap-sessioncmd parameter and a URL in the sap-exiturl parameter. | |||||
CVE-2005-3633 | 1 Sap | 1 Sap Web Application Server | 2017-07-11 | 5.0 MEDIUM | N/A |
HTTP response splitting vulnerability in frameset.htm in SAP Web Application Server (WAS) 6.10 through 7.00 allows remote attackers to inject arbitrary HTML headers via the sap-exiturl parameter. | |||||
CVE-2003-1039 | 1 Sap | 1 Mysap Business Suite | 2017-07-11 | 7.5 HIGH | N/A |
Multiple buffer overflows in the mySAP.com architecture for SAP allow remote attackers to execute arbitrary code via a long HTTP Host header to (1) Message Server, (2) Web Dispatcher, or (3) Application Server. | |||||
CVE-2003-1038 | 1 Sap | 1 Internet Transaction Server | 2017-07-11 | 5.0 MEDIUM | N/A |
The AGate component for SAP Internet Transaction Server (ITS) allows remote attackers to obtain sensitive information via a ~command parameter with an AgateInstallCheck value, which provides a list of installed DLLs and full pathnames. | |||||
CVE-2003-1037 | 1 Sap | 1 Internet Transaction Server | 2017-07-11 | 7.5 HIGH | N/A |
Format string vulnerability in the WGate component for SAP Internet Transaction Server (ITS) allows remote attackers to execute arbitrary code via a high "trace level." | |||||
CVE-2003-1036 | 1 Sap | 1 Internet Transaction Server | 2017-07-11 | 7.5 HIGH | N/A |
Multiple buffer overflows in the AGate component for SAP Internet Transaction Server (ITS) allow remote attackers to execute arbitrary code via long (1) ~command, (2) ~runtimemode, or (3) ~session parameters, or (4) a long HTTP Content-Type header. | |||||
CVE-2003-1034 | 1 Sap | 1 Sap Db | 2017-07-11 | 4.6 MEDIUM | N/A |
The RPM installation of SAP DB 7.x creates the (1) dbmsrv or (2) lserver programs with world-writable permissions, which allows local users to gain privileges by modifying those programs. | |||||
CVE-2003-1033 | 1 Sap | 1 Sap Db | 2017-07-11 | 7.2 HIGH | N/A |
The (1) instdbmsrv and (2) instlserver programs in SAP DB Development Tools 7.x trust the user-provided INSTROOT environment variable as a path when assigning setuid permissions to the lserver program, which allows local users to gain root privileges via a modified INSTROOT that points to a malicious dbmsrv or lserver program. | |||||
CVE-2003-0945 | 1 Sap | 1 Sap Db | 2017-07-11 | 7.5 HIGH | N/A |
The Web Database Manager in web-tools for SAP DB before 7.4.03.30 generates predictable session IDs, which allows remote attackers to conduct unauthorized activities. | |||||
CVE-2003-0938 | 1 Sap | 1 Sap Db | 2017-07-11 | 7.2 HIGH | N/A |
vos24u.c in SAP database server (SAP DB) 7.4.03.27 and earlier allows local users to gain SYSTEM privileges via a malicious "NETAPI32.DLL" in the current working directory, which is found and loaded by SAP DB before the real DLL, as demonstrated using the SQLAT stored procedure. | |||||
CVE-2003-0748 | 1 Sap | 1 Internet Transaction Server | 2017-07-11 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in wgate.dll for SAP Internet Transaction Server (ITS) 4620.2.0.323011 allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the ~theme parameter and a ~template parameter with a filename followed by space characters, which can prevent SAP from effectively adding a .html extension to the filename. | |||||
CVE-2003-0747 | 1 Sap | 1 Internet Transaction Server | 2017-07-11 | 5.0 MEDIUM | N/A |
wgate.dll in SAP Internet Transaction Server (ITS) 4620.2.0.323011 allows remote attackers to obtain potentially sensitive information such as directory structure and operating system via incorrect parameters (1) ~service, (2) ~templatelanguage, (3) ~language, (4) ~theme, or (5) ~template, which leaks the information in the resulting error message. |