Critical
Oracle
06/14/2018
By exploiting this vulnerability, unauthenticated attacker could execute arbitrary SQL statements.
Critical
Oracle
06/14/2018
By exploiting this vulnerability, an unauthenticated attacker could execute arbitrary SQL statements.
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get sensitive information.
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could modify business information.
Critical
Oracle
06/14/2018
By exploiting this vulnerability, an unauthenticated attacker could render the platform in-operative.
Medium
SAP
06/14/2018
By exploiting this vulnerability, an attacker who previously accessed a mobile phone connected to an SAP system could potentially access all the business information stored and processed in the SAP…
High
Oracle
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get sensitive information.
Medium
SAP
06/14/2018
By exploiting this vulnerability an unauthenticated attacker could access and modify any information indexed by the SAP system.
Medium
SAP
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker may discover security vulnerabilities affecting the system, potentially being able to leverage them in a second step.
Medium
SAP
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker may discover security vulnerabilities affecting the system, potentially being able to leverage them in a second step.
Medium
SAP
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get information about the system architecture.
Medium
SAP
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get business information.