cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-6177,https://securityvulnerability.io/vulnerability/CVE-2020-6177,,"SAP Mobile Platform, version 3.0, does not sufficiently validate an XML document accepted from an untrusted source which could lead to partial denial of service. Since SAP Mobile Platform does not allow External-Entity resolving, there is no issue of leaking content of files on the server.",SAP,SAP Mobile Platform,4.3,MEDIUM,0.000750000006519258,false,false,false,false,,false,false,2020-02-12T19:45:38.000Z,0 CVE-2019-0274,https://securityvulnerability.io/vulnerability/CVE-2019-0274,,"SAP Mobile Platform SDK allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service (i.e. denial of service). Fixed in versions 3.1 SP03 PL02, SDK 3.1 SP04, or later.",SAP,SAP Mobile Platform Sdk,7.5,HIGH,0.002409999957308173,false,false,false,false,,false,false,2019-03-12T22:00:00.000Z,0 CVE-2018-2459,https://securityvulnerability.io/vulnerability/CVE-2018-2459,,"Users of an SAP Mobile Platform (version 3.0) Offline OData application, which uses Offline OData-supplied delta tokens (which is on by default), occasionally receive some data values of a different user.",SAP,SAP Mobile Platform,7.5,HIGH,0.001560000004246831,false,false,false,false,,false,false,2018-09-11T15:00:00.000Z,0