Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap sapgui 4.6d vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2007-4475
Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui prior to 7.10 Patch Level 9 allows remote malicious users to execute arbitrary code via a long argument to the SaveViewToSessionFile method.
Sap Sapgui 4.6a
Sap Sapgui 4.6c
Sap Sapgui 4.6d
Sap Sapgui 4.6
Sap Sapgui 4.6b
Sap Sapgui
Sap Sapgui 6.40
2 EDB exploits
7.5
CVSSv2
CVE-2003-1035
The default installation of SAP R/3 46C/D allows remote malicious users to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.
Sap Sapgui 4.6d
Sap Sap R 3
Sap Sapgui 4.6c
5
CVSSv2
CVE-2002-1579
SAP GUI (Sapgui) 4.6D allows remote malicious users to cause a denial of service (crash) via a connection to a high-numbered port, which generates an "unknown connection data" error.
Sap Sapgui 4.6b
Sap Sapgui 4.6c
Sap Sapgui 4.6
Sap Sapgui 4.6a
Sap Sapgui 4.6d
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-34377
CVE-2024-20859
CVE-2023-49606
inject
arbitrary
CVE-2024-33788
CVE-2024-30973
IDOR
CVE-2024-33907
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started