Critical
Oracle
06/13/2018
By exploiting this vulnerability, an unauthenticated attacker could execute arbitrary SQL statements.
Critical
Oracle
02/09/2018
By exploiting this vulnerability, unauthenticated attacker could execute arbitrary SQL statements.
High
Oracle
02/09/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
Medium
Oracle
02/09/2018
By exploiting this vulnerability, a remote authenticated attacker could modify calendar events.
Medium
Oracle
02/09/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get access to sensitive information.
Medium
SAP
02/09/2018
By exploiting this vulnerability, a remote attacker may obtain clear-text passwords of SAP Mobile Defense and Security users and get critical information.
Medium
SAP
02/09/2018
By exploiting this vulnerability, a remote attacker may obtain clear-text passwords of SAP Mobile Defense and Security users and get critical information.
Medium
SAP
02/09/2018
By exploiting this vulnerability, an unauthenticated attacker may obtain clear-text passwords of SAP Mobile users and get critical information.
Medium
SAP
02/09/2018
By exploiting this vulnerability, an unauthenticated attacker could inject malicious code in the back-office application to get or modify information systems.
Medium
SAP
02/09/2018
By exploiting this vulnerability, a remote unauthenticated attacker could get information about the system architecture.
Medium
SAP
07/18/2017
By exploiting this vulnerability an attacker could learn the SAP version and then understand which vulnerabilities could exploit.
Medium
SAP
06/13/2017
By exploiting this SAP Vulnerability an attacker that has previously compromised a workstation could access additional information from the SAP applications