Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sap solution manager 7.20 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2016-10005
Webdynpro in SAP Solman 7.1 up to and including 7.31 allows remote malicious users to obtain sensitive information via webdynpro/dispatcher/sap.com/caf~eu~gp~example~timeoff~wd requests, aka SAP Security Note 2344524.
Sap Solution Manager 7.1
Sap Solution Manager 7.20
Sap Solution Manager 7.31
5.4
CVSSv3
CVE-2018-2405
SAP Solution Manager, 7.10, 7.20, Incident Management Work Center allows an malicious user to upload a malicious script as an attachment and this could lead to possible Cross-Site Scripting.
Sap Solution Manager 7.20
Sap Solution Manager 7.10
9.1
CVSSv3
CVE-2022-22544
Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing se...
Sap Solution Manager 7.20
10
CVSSv3
CVE-2020-26823
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated malicious user to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service.
Sap Solution Manager 7.20
8.8
CVSSv3
CVE-2018-2361
In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools.
Sap Solution Manager 7.20
4.9
CVSSv3
CVE-2021-21483
Under certain conditions SAP Solution Manager, version - 720, allows a high privileged malicious user to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application.
Sap Solution Manager 7.20
5.3
CVSSv3
CVE-2020-6260
SAP Solution Manager (Trace Analysis), version 7.20, allows an malicious user to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist.
Sap Solution Manager 7.20
5.3
CVSSv3
CVE-2020-6261
SAP Solution Manager (Trace Analysis), version 7.20, allows an malicious user to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
Sap Solution Manager 7.20
10
CVSSv3
CVE-2020-26821
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated malicious user to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service.
Sap Solution Manager 7.20
10
CVSSv3
CVE-2020-26822
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated malicious user to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service.
Sap Solution Manager 7.20
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »