| 1 |
http://packetstormsecurity.com/files/126986/SAP-SLD-Information-Tampering.html
|
|
|
| 2 |
http://packetstormsecurity.com/files/126986/SAP-SLD-Information-Tampering.html
|
|
|
| 3 |
http://scn.sap.com/docs/DOC-8218
|
|
|
| 4 |
http://scn.sap.com/docs/DOC-8218
|
|
|
| 5 |
http://seclists.org/fulldisclosure/2014/Jun/37
|
|
|
| 6 |
http://seclists.org/fulldisclosure/2014/Jun/37
|
|
|
| 7 |
http://secunia.com/advisories/58633
|
|
|
| 8 |
http://secunia.com/advisories/58633
|
|
|
| 9 |
http://www.securityfocus.com/archive/1/532331/100/0/threaded
|
|
|
| 10 |
http://www.securityfocus.com/archive/1/532331/100/0/threaded
|
|
|
| 11 |
http://www.securityfocus.com/bid/67923
|
|
|
| 12 |
http://www.securityfocus.com/bid/67923
|
|
|
| 13 |
https://service.sap.com/sap/support/notes/1939334
|
|
|
| 14 |
https://service.sap.com/sap/support/notes/1939334
|
|
|