Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-1578
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The default installation of SAP R/3, when using Oracle and SQL*net V2 3.x, 4.x, and 6.10, allows remote attackers to obtain arbitrary, sensitive SAP data by directly connecting to the Oracle database and executing queries against the database, which is not password-protected.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ORACLE SAP R/3未授权数据访问漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP一套针对所有企业的一种数据和应用集成企业管理软件,可使用在多种Linux和Unix操作系统下,也可使用在Microsoft Windows操作系统下。 ORACLE的SAP R/3默认安装存在缺陷,可导致远程攻击者未授权访问SAP数据。 每个可以访问数据库主机的Oracle Listener端口的攻击者,通过数据库主机的IP地址和系统ID(SID)结合无需授权就可以读/写/修改任意SAP数据,数据库主机的IP地址和系统ID(SID)可以通过包嗅探、社会工程学或对SAP R/3运行sapinfo等方法
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-1578
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-1578
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2002-1578

No comments yet


Leave a comment