Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap sapgui 4.6d vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2002-1579
SAP GUI (Sapgui) 4.6D allows remote malicious users to cause a denial of service (crash) via a connection to a high-numbered port, which generates an "unknown connection data" error.
Sap Sapgui 4.6b
Sap Sapgui 4.6c
Sap Sapgui 4.6
Sap Sapgui 4.6a
Sap Sapgui 4.6d
9.3
CVSSv2
CVE-2007-4475
Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui prior to 7.10 Patch Level 9 allows remote malicious users to execute arbitrary code via a long argument to the SaveViewToSessionFile method.
Sap Sapgui 4.6a
Sap Sapgui 4.6c
Sap Sapgui 4.6d
Sap Sapgui 4.6
Sap Sapgui 4.6b
Sap Sapgui
Sap Sapgui 6.40
2 EDB exploits
7.5
CVSSv2
CVE-2003-1035
The default installation of SAP R/3 46C/D allows remote malicious users to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.
Sap Sapgui 4.6d
Sap Sap R 3
Sap Sapgui 4.6c
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3661
open redirect
CVE-2024-25512
CVE-2024-33788
command injection
SSTI
CVE-2024-0043
CVE-2024-29210
CVE-2024-25510
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started