CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5962 | CVE-2002-1578 | Candidate | The default installation of SAP R/3, when using Oracle and SQL*net V2 3.x, 4.x, and 6.10, allows remote attackers to obtain arbitrary, sensitive SAP data by directly connecting to the Oracle database and executing queries against the database, which is not password-protected. | Assigned (20040315) | None (candidate not yet proposed) | View | |
7857 | CVE-2003-1033 | Candidate | The (1) instdbmsrv and (2) instlserver programs in SAP DB Development Tools 7.x trust the user-provided INSTROOT environment variable as a path when assigning setuid permissions to the lserver program, which allows local users to gain root privileges via a modified INSTROOT that points to a malicious dbmsrv or lserver program. | Assigned (20040315) | None (candidate not yet proposed) | View | |
7858 | CVE-2003-1034 | Candidate | The RPM installation of SAP DB 7.x creates the (1) dbmsrv or (2) lserver programs with world-writable permissions, which allows local users to gain privileges by modifying those programs. | Assigned (20040315) | None (candidate not yet proposed) | View | |
7859 | CVE-2003-1035 | Candidate | The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does. | Assigned (20040315) | None (candidate not yet proposed) | View | |
7860 | CVE-2003-1036 | Candidate | Multiple buffer overflows in the AGate component for SAP Internet Transaction Server (ITS) allow remote attackers to execute arbitrary code via long (1) ~command, (2) ~runtimemode, or (3) ~session parameters, or (4) a long HTTP Content-Type header. | Assigned (20040315) | None (candidate not yet proposed) | View |
Page 20103 of 20943, showing 5 records out of 104715 total, starting on record 100511, ending on 100515