- EPSS 5.64%
- Veröffentlicht 06.02.2008 12:00:00
- Zuletzt bearbeitet 23.04.2026 00:35:47
SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate.
CVE-2008-0621
- EPSS 88%
- Veröffentlicht 06.02.2008 12:00:00
- Zuletzt bearbeitet 23.04.2026 00:35:47
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
- EPSS 0.74%
- Veröffentlicht 15.04.2004 04:00:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an "unknown connection data" error.
CVE-2003-1035
- EPSS 0.36%
- Veröffentlicht 15.04.2004 04:00:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.