Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap ui 7.51 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-0388
SAP UI5 HTTP Handler (corrected in SAP_UI versions 7.5, 7.51, 7.52, 7.53, 7.54 and SAP UI_700 version 2.0) allows an malicious user to manipulate content due to insufficient URL validation.
Sap Ui 7.5
Sap Ui 7.51
Sap Ui 7.52
Sap Ui 2.0
Sap Ui 7.53
Sap Ui 7.54
4.3
CVSSv2
CVE-2018-2434
A content spoofing vulnerability in the following components allows to render html pages containing arbitrary plain text content, which might fool an end user: UI add-on for SAP NetWeaver (UI_Infra, 1.0), SAP UI Implementation for Decoupled Innovations (UI_700, 2.0): SAP NetWeave...
Sap Netweaver 7.0
Sap Ui Infra 1.0
Sap User Interface Technology 7.4
Sap User Interface Technology 7.5
Sap User Interface Technology 7.51
Sap User Interface Technology 7.52
5
CVSSv2
CVE-2018-2428
Under certain conditions SAP UI5 Handler allows an malicious user to access information which would otherwise be restricted. Software components affected are: SAP Infrastructure 1.0, SAP UI 7.4, 7.5, 7.51, 7.52 and version 2.0 of SAP UI for SAP NetWeaver 7.00.
Sap Ui 7.4
Sap Ui 7.5
Sap Ui 7.51
Sap Ui 7.52
Sap Infrastructure 1.0
Sap Ui 2.0
5
CVSSv2
CVE-2018-2424
SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Jav...
Sap Hana Database 2.00
Sap Hana Database 1.00
Sap Ui 7.51
Sap Ui 7.52
Sap Ui 2.0
Sap Ui 7.40
Sap Ui 7.50
Sap Ui5 Java 7.30
Sap Ui5 Java 7.31
Sap Ui5 Java 7.40
Sap Ui5 Java 7.50
Sap Ui5 1.00
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started