Medium
SAP
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker may discover security vulnerabilities affecting the system, potentially being able to leverage them in a second step.
Medium
SAP
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker may discover security vulnerabilities affecting the system, potentially being able to leverage them in a second step.
Medium
SAP
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get information about the system architecture.
Medium
SAP
06/14/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get business information.
Critical
Oracle
06/13/2018
By exploiting this vulnerability, an unauthenticated attacker could execute arbitrary SQL statements.
Critical
Oracle
02/09/2018
By exploiting this vulnerability, unauthenticated attacker could execute arbitrary SQL statements.
High
Oracle
02/09/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
Oracle
02/09/2018
By exploiting this vulnerability, a remote authenticated attacker could modify calendar events.
Medium
Oracle
02/09/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get access to sensitive information.
Medium
SAP
02/09/2018
By exploiting this vulnerability, a remote attacker may obtain clear-text passwords of SAP Mobile Defense and Security users and get critical information.
Medium
SAP
02/09/2018
By exploiting this vulnerability, a remote attacker may obtain clear-text passwords of SAP Mobile Defense and Security users and get critical information.
Medium
SAP
02/09/2018
By exploiting this vulnerability, an unauthenticated attacker may obtain clear-text passwords of SAP Mobile users and get critical information.