cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-27902,https://securityvulnerability.io/vulnerability/CVE-2024-27902,SAP GUI for HTML in SAP NetWeaver AS ABAP vulnerable to Cross-Site Scripting (XSS),"Applications based on SAP GUI for HTML in SAP NetWeaver AS ABAP - versions 7.89, 7.93, do not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. A successful attack can allow a malicious attacker to access and modify data through their ability to execute code in a user’s browser. There is no impact on the availability of the system ",SAP,SAP Netweaver As Abap Applications Based On SAPgui For Html (webgui),5.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-03-12T00:45:08.794Z,0 CVE-2007-4475,https://securityvulnerability.io/vulnerability/CVE-2007-4475,,Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method.,SAP,SAPgui,,,0.916700005531311,false,false,false,false,,false,false,2009-04-01T18:00:00.000Z,0 CVE-2008-4387,https://securityvulnerability.io/vulnerability/CVE-2008-4387,,Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer.,SAP,"SAPgui,MdrmSAP Activex Control",,,0.04328000172972679,false,false,false,false,,false,false,2008-11-10T16:00:00.000Z,0 CVE-2008-0621,https://securityvulnerability.io/vulnerability/CVE-2008-0621,,"Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.",SAP,"SAPgui,SAPlpd,SAPsprint",,,0.935230016708374,false,false,false,false,,false,false,2008-02-06T11:00:00.000Z,0 CVE-2008-0620,https://securityvulnerability.io/vulnerability/CVE-2008-0620,,"SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate.",SAP,"SAPgui,SAPlpd,SAPsprint",,,0.048250000923871994,false,false,false,false,,false,false,2008-02-06T11:00:00.000Z,0 CVE-2003-1035,https://securityvulnerability.io/vulnerability/CVE-2003-1035,,"The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.",SAP,"SAPgui,SAP R 3",,,0.009519999846816063,false,false,false,false,,false,false,2004-04-15T04:00:00.000Z,0 CVE-2002-1579,https://securityvulnerability.io/vulnerability/CVE-2002-1579,,"SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an ""unknown connection data"" error.",SAP,SAPgui,,,0.008910000324249268,false,false,false,false,,false,false,2004-04-15T04:00:00.000Z,0