Filtered by vendor Sas
Subscribe
Search
Total
6 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2014-2262 | 1 Sas | 1 Base Sas | 2018-10-09 | 9.3 HIGH | N/A |
| Buffer overflow in the client application in Base SAS 9.2 TS2M3, SAS 9.3 TS1M1 and TS1M2, and SAS 9.4 TS1M0 allows user-assisted remote attackers to execute arbitrary code via a crafted SAS program. | |||||
| CVE-2014-5454 | 1 Sas | 1 Visual Analytics | 2017-09-08 | 6.0 MEDIUM | N/A |
| Unrestricted file upload vulnerability in the image upload module in SAS Visual Analytics 6.4M1 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors. | |||||
| CVE-2002-0218 | 1 Sas | 2 Sas Base, Sas Integration Technologies | 2008-09-11 | 7.2 HIGH | N/A |
| Format string vulnerability in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via format specifiers in a command line argument. | |||||
| CVE-2002-0219 | 1 Sas | 2 Sas Base, Sas Integration Technologies | 2008-09-11 | 7.2 HIGH | N/A |
| Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument. | |||||
| CVE-2002-2017 | 1 Sas | 2 Base, Integration Technologies | 2008-09-05 | 10.0 HIGH | N/A |
| sastcpd in SAS/Base 8.0 allows local users to execute arbitrary code by setting the authprog environment variable to reference a malicious program, which is then executed by sastcpd. | |||||
| CVE-2002-2018 | 1 Sas | 2 Base, Integration Technologies | 2008-09-05 | 7.2 HIGH | N/A |
| sastcpd in SAS/Base 8.0 might allow local users to gain privileges by setting the netencralg environment variable, which causes a segmentation fault. | |||||
