Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap solution manager 7.20 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2016-10005
Webdynpro in SAP Solman 7.1 up to and including 7.31 allows remote malicious users to obtain sensitive information via webdynpro/dispatcher/sap.com/caf~eu~gp~example~timeoff~wd requests, aka SAP Security Note 2344524.
Sap Solution Manager 7.1
Sap Solution Manager 7.20
Sap Solution Manager 7.31
5.4
CVSSv3
CVE-2018-2405
SAP Solution Manager, 7.10, 7.20, Incident Management Work Center allows an malicious user to upload a malicious script as an attachment and this could lead to possible Cross-Site Scripting.
Sap Solution Manager 7.20
Sap Solution Manager 7.10
9.8
CVSSv3
CVE-2020-6207
SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
Sap Solution Manager 7.20
2 Metasploit modules
2 Github repositories
1 Article
5.3
CVSSv3
CVE-2020-6260
SAP Solution Manager (Trace Analysis), version 7.20, allows an malicious user to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist.
Sap Solution Manager 7.20
10
CVSSv3
CVE-2020-26824
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated malicious user to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service.
Sap Solution Manager 7.20
9.1
CVSSv3
CVE-2022-22544
Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing se...
Sap Solution Manager 7.20
9.8
CVSSv3
CVE-2020-6198
SAP Solution Manager (Diagnostics Agent), version 720, allows unencrypted connections from unauthenticated sources. This allows an malicious user to control all remote functions on the Agent due to Missing Authentication Check.
Sap Solution Manager 7.20
5.3
CVSSv3
CVE-2020-6261
SAP Solution Manager (Trace Analysis), version 7.20, allows an malicious user to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
Sap Solution Manager 7.20
4.9
CVSSv3
CVE-2021-21483
Under certain conditions SAP Solution Manager, version - 720, allows a high privileged malicious user to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application.
Sap Solution Manager 7.20
8.8
CVSSv3
CVE-2018-2361
In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools.
Sap Solution Manager 7.20
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2024-5274
CVE-2020-17519
CVE-2024-35340
CVE-2021-47558
local
XML injection
CVE-2021-47519
CVE-2021-47543
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »