Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap solution manager 7.20 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2016-10005
Webdynpro in SAP Solman 7.1 up to and including 7.31 allows remote malicious users to obtain sensitive information via webdynpro/dispatcher/sap.com/caf~eu~gp~example~timeoff~wd requests, aka SAP Security Note 2344524.
Sap Solution Manager 7.1
Sap Solution Manager 7.20
Sap Solution Manager 7.31
312
VMScore
CVE-2018-2405
SAP Solution Manager, 7.10, 7.20, Incident Management Work Center allows an malicious user to upload a malicious script as an attachment and this could lead to possible Cross-Site Scripting.
Sap Solution Manager 7.20
Sap Solution Manager 7.10
356
VMScore
CVE-2021-21483
Under certain conditions SAP Solution Manager, version - 720, allows a high privileged malicious user to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application.
Sap Solution Manager 7.20
NA
CVE-2023-36921
SAP Solution Manager (Diagnostics agent) - version 7.20, allows an malicious user to tamper with headers in a client request. This misleads SAP Diagnostics Agent to serve poisoned content to the server. On successful exploitation, the attacker can cause a limited impact on confid...
Sap Solution Manager 7.20
NA
CVE-2023-36925
SAP Solution Manager (Diagnostics agent) - version 7.20, allows an unauthenticated malicious user to blindly execute HTTP requests. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application and other applications th...
Sap Solution Manager 7.20
570
VMScore
CVE-2020-26822
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated malicious user to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service.
Sap Solution Manager 7.20
1000
VMScore
CVE-2020-6207
SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
Sap Solution Manager 7.20
2 Metasploit modules
2 Github repositories
1 Article
445
VMScore
CVE-2020-6260
SAP Solution Manager (Trace Analysis), version 7.20, allows an malicious user to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist.
Sap Solution Manager 7.20
668
VMScore
CVE-2020-6198
SAP Solution Manager (Diagnostics Agent), version 720, allows unencrypted connections from unauthenticated sources. This allows an malicious user to control all remote functions on the Agent due to Missing Authentication Check.
Sap Solution Manager 7.20
570
VMScore
CVE-2020-26823
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated malicious user to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service.
Sap Solution Manager 7.20
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »