SAP

SAP GUI

12 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 12.08.2025 02:05:44
  • Last modified 12.08.2025 14:25:33

SAP GUI for Windows may allow the leak of NTML hashes when specific ABAP frontend services are called with UNC paths. For a successful attack, the attacker needs developer authorization in a specific Application Server ABAP to make changes in the cod...

  • EPSS 0.02%
  • Published 08.07.2025 00:37:55
  • Last modified 08.07.2025 16:18:14

The GuiXT application, which is integrated with SAP GUI for Windows, uses obfuscation algorithms instead of secure symmetric ciphers for storing the credentials of an RFC user on the client PC. This leads to a high impact on confidentiality because a...

Media report
  • EPSS 0.02%
  • Published 13.05.2025 00:18:51
  • Last modified 13.05.2025 19:35:18

SAP GUI for Windows allows an unauthenticated attacker to exploit insecure obfuscation algorithms used by the GuiXT application to store user credentials. While this issue does not impact the Integrity or Availability of the application, it may have ...

  • EPSS 0.03%
  • Published 11.02.2025 01:15:11
  • Last modified 18.02.2025 18:15:33

SAP GUI for Windows & RFC service credentials are incorrectly stored in the memory of the program allowing an unauthenticated attacker to access information within systems, resulting in privilege escalation. On successful exploitation, this could res...

  • EPSS 0.03%
  • Published 14.01.2025 01:15:15
  • Last modified 14.01.2025 01:15:15

SAP GUI for Windows stores user input on the client PC to improve usability. Under very specific circumstances an attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read thi...

  • EPSS 0.03%
  • Published 14.01.2025 01:15:15
  • Last modified 14.01.2025 01:15:15

SAP GUI for Java saves user input on the client PC to improve usability. An attacker with administrative privileges or access to the victim�s user directory on the Operating System level would be able to read this data. Depending on the user input pr...

  • EPSS 68%
  • Published 01.04.2009 18:30:00
  • Last modified 09.04.2025 00:30:58

Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method.

  • EPSS 5.82%
  • Published 10.11.2008 16:15:04
  • Last modified 09.04.2025 00:30:58

Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer.

Exploit
  • EPSS 4.98%
  • Published 06.02.2008 12:00:00
  • Last modified 09.04.2025 00:30:58

SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate.

Exploit
  • EPSS 88.16%
  • Published 06.02.2008 12:00:00
  • Last modified 09.04.2025 00:30:58

Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.