Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap ui 7.51 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-0388
SAP UI5 HTTP Handler (corrected in SAP_UI versions 7.5, 7.51, 7.52, 7.53, 7.54 and SAP UI_700 version 2.0) allows an malicious user to manipulate content due to insufficient URL validation.
Sap Ui 2.0
Sap Ui 7.5
Sap Ui 7.51
Sap Ui 7.52
Sap Ui 7.53
Sap Ui 7.54
5
CVSSv2
CVE-2018-2428
Under certain conditions SAP UI5 Handler allows an malicious user to access information which would otherwise be restricted. Software components affected are: SAP Infrastructure 1.0, SAP UI 7.4, 7.5, 7.51, 7.52 and version 2.0 of SAP UI for SAP NetWeaver 7.00.
Sap Ui 7.52
Sap Infrastructure 1.0
Sap Ui 2.0
Sap Ui 7.5
Sap Ui 7.4
Sap Ui 7.51
5
CVSSv2
CVE-2018-2424
SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Jav...
Sap Ui 7.51
Sap Ui 7.52
Sap Ui5 Java 7.30
Sap Ui5 Java 7.31
Sap Ui 2.0
Sap Ui 7.50
Sap Ui5 Java 7.40
Sap Ui5 1.00
Sap Hana Database 2.00
Sap Ui 7.40
Sap Ui5 Java 7.50
Sap Hana Database 1.00
4.3
CVSSv2
CVE-2018-2434
A content spoofing vulnerability in the following components allows to render html pages containing arbitrary plain text content, which might fool an end user: UI add-on for SAP NetWeaver (UI_Infra, 1.0), SAP UI Implementation for Decoupled Innovations (UI_700, 2.0): SAP NetWeave...
Sap Ui Infra 1.0
Sap User Interface Technology 7.5
Sap User Interface Technology 7.51
Sap User Interface Technology 7.52
Sap Netweaver 7.0
Sap User Interface Technology 7.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started