Filtered by vendor Sap
Subscriptions
Filtered by product Solution Manager
Subscriptions
Total
33 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-36921 | 1 Sap | 1 Solution Manager | 2024-11-12 | 7.2 High |
SAP Solution Manager (Diagnostics agent) - version 7.20, allows an attacker to tamper with headers in a client request. This misleads SAP Diagnostics Agent to serve poisoned content to the server. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application. | ||||
CVE-2023-36925 | 1 Sap | 1 Solution Manager | 2024-11-12 | 7.2 High |
SAP Solution Manager (Diagnostics agent) - version 7.20, allows an unauthenticated attacker to blindly execute HTTP requests. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application and other applications the Diagnostics Agent can reach. | ||||
CVE-2013-7363 | 1 Sap | 1 Solution Manager | 2024-09-17 | N/A |
Unspecified vulnerability in the Diagnostics (SMD) agent in SAP Solution Manager allows remote attackers to obtain sensitive information, modify the configuration of applications, and install or remove applications via vectors involving the P4 protocol. | ||||
CVE-2014-5175 | 1 Sap | 1 Solution Manager | 2024-08-06 | N/A |
The License Measurement servlet in SAP Solution Manager 7.1 allows remote attackers to bypass authentication via unspecified vectors, related to a verb tampering attack and SAP_JTECHS. | ||||
CVE-2016-10005 | 1 Sap | 1 Solution Manager | 2024-08-06 | N/A |
Webdynpro in SAP Solman 7.1 through 7.31 allows remote attackers to obtain sensitive information via webdynpro/dispatcher/sap.com/caf~eu~gp~example~timeoff~wd requests, aka SAP Security Note 2344524. | ||||
CVE-2018-2405 | 1 Sap | 1 Solution Manager | 2024-08-05 | N/A |
SAP Solution Manager, 7.10, 7.20, Incident Management Work Center allows an attacker to upload a malicious script as an attachment and this could lead to possible Cross-Site Scripting. | ||||
CVE-2018-2361 | 1 Sap | 1 Solution Manager | 2024-08-05 | N/A |
In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools. | ||||
CVE-2019-0307 | 1 Sap | 1 Solution Manager | 2024-08-04 | N/A |
Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker with admin privileges could gain access to the entire configuration, but no system sensitive information can be gained. | ||||
CVE-2019-0291 | 1 Sap | 1 Solution Manager | 2024-08-04 | N/A |
Under certain conditions Solution Manager, version 7.2, allows an attacker to access information which would otherwise be restricted. | ||||
CVE-2020-26837 | 1 Sap | 1 Solution Manager | 2024-08-04 | 9.1 Critical |
SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable. | ||||
CVE-2020-26830 | 1 Sap | 1 Solution Manager | 2024-08-04 | 8.1 High |
SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, does not perform necessary authorization checks for an authenticated user. Due to inadequate access control, a network attacker authenticated as a regular user can use operations which should be restricted to administrators. These operations can be used to Change the User Experience Monitoring configuration, obtain details about the configured SAP Solution Manager agents, Deploy a malicious User Experience Monitoring script. | ||||
CVE-2020-26823 | 1 Sap | 1 Solution Manager | 2024-08-04 | 10.0 Critical |
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service. | ||||
CVE-2020-26836 | 1 Sap | 1 Solution Manager | 2024-08-04 | 6.1 Medium |
SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack. | ||||
CVE-2020-26824 | 1 Sap | 1 Solution Manager | 2024-08-04 | 10.0 Critical |
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service. | ||||
CVE-2020-26821 | 1 Sap | 1 Solution Manager | 2024-08-04 | 10.0 Critical |
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service. | ||||
CVE-2020-26822 | 1 Sap | 1 Solution Manager | 2024-08-04 | 10.0 Critical |
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service. | ||||
CVE-2020-6369 | 1 Sap | 2 Focused Run, Solution Manager | 2024-08-04 | 5.9 Medium |
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service. | ||||
CVE-2020-6271 | 1 Sap | 1 Solution Manager | 2024-08-04 | 8.2 High |
SAP Solution Manager (Problem Context Manager), version 7.2, does not perform the necessary authentication, allowing an attacker to consume large amounts of memory, causing the system to crash and read restricted data (files visible for technical administration users of the diagnostics agent). | ||||
CVE-2020-6235 | 1 Sap | 1 Solution Manager | 2024-08-04 | 8.6 High |
SAP Solution Manager (Diagnostics Agent), version 7.2, does not perform the authentication check for the functionalities of the Collector Simulator, leading to Missing Authentication. | ||||
CVE-2020-6260 | 1 Sap | 1 Solution Manager | 2024-08-04 | 5.3 Medium |
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist. |