The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of SAP Customer Relationship Management

jQuery Core: privilege escalation via Object.prototype Pollution
An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges...
bulletinoct2019, cpuapr2020, cpujan2020, cpujul2019, cpujul2020, cpuoct2019, cpuoct2020, CST-7312, CVE-2019-11358, DLA-1797-1, DLA-2118-1, DRUPAL-SA-CORE-2019-005, DRUPAL-SA-CORE-2019-006, DSA-4460-1, EZSA-2019-005, FEDORA-2019-2a0ce0c58c, FEDORA-2019-a06dffab1c, FEDORA-2019-f563e66380, NTAP-20190919-0001, openSUSE-SU-2019:1839-1, openSUSE-SU-2019:1872-1, RHSA-2019:1456-01, RHSA-2020:3936-01, RHSA-2020:4670-01, RHSA-2020:4847-01, SA44601, Synology-SA-19:19, VIGILANCE-VUL-29030
SAP: multiples vulnerabilities of January 2019
An attacker can use several vulnerabilities of SAP products...
CVE-2018-2484, CVE-2018-2499, CVE-2019-0238, CVE-2019-0240, CVE-2019-0241, CVE-2019-0243, CVE-2019-0244, CVE-2019-0245, CVE-2019-0246, CVE-2019-0247, CVE-2019-0248, CVE-2019-0249, VIGILANCE-VUL-28185
Our database contains other pages. You can request a free trial to read them.

Display information about SAP Customer Relationship Management: