Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap ui 7.51 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2019-0388
SAP UI5 HTTP Handler (corrected in SAP_UI versions 7.5, 7.51, 7.52, 7.53, 7.54 and SAP UI_700 version 2.0) allows an malicious user to manipulate content due to insufficient URL validation.
Sap Ui 2.0
Sap Ui 7.5
Sap Ui 7.51
Sap Ui 7.52
Sap Ui 7.53
Sap Ui 7.54
445
VMScore
CVE-2018-2428
Under certain conditions SAP UI5 Handler allows an malicious user to access information which would otherwise be restricted. Software components affected are: SAP Infrastructure 1.0, SAP UI 7.4, 7.5, 7.51, 7.52 and version 2.0 of SAP UI for SAP NetWeaver 7.00.
Sap Ui 7.52
Sap Infrastructure 1.0
Sap Ui 2.0
Sap Ui 7.5
Sap Ui 7.4
Sap Ui 7.51
445
VMScore
CVE-2018-2424
SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Jav...
Sap Ui 7.51
Sap Ui 7.52
Sap Ui5 Java 7.30
Sap Ui5 Java 7.31
Sap Ui 2.0
Sap Ui 7.50
Sap Ui5 Java 7.40
Sap Ui5 1.00
Sap Hana Database 2.00
Sap Ui 7.40
Sap Ui5 Java 7.50
Sap Hana Database 1.00
383
VMScore
CVE-2018-2434
A content spoofing vulnerability in the following components allows to render html pages containing arbitrary plain text content, which might fool an end user: UI add-on for SAP NetWeaver (UI_Infra, 1.0), SAP UI Implementation for Decoupled Innovations (UI_700, 2.0): SAP NetWeave...
Sap Ui Infra 1.0
Sap User Interface Technology 7.5
Sap User Interface Technology 7.51
Sap User Interface Technology 7.52
Sap Netweaver 7.0
Sap User Interface Technology 7.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started