cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-49587,https://securityvulnerability.io/vulnerability/CVE-2023-49587,Command Injection vulnerability in SAP Solution Manager,"SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated function modules which can read or modify data of same or other component without user interaction over the network. ",SAP,SAP Solution Manager,6.4,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2023-12-12T02:15:00.000Z,0 CVE-2023-36921,https://securityvulnerability.io/vulnerability/CVE-2023-36921,Header Injection in SAP Solution Manager (Diagnostic Agent),"The SAP Solution Manager's Diagnostics Agent in version 7.20 contains a vulnerability that allows an attacker to manipulate headers in a client request. This manipulation can lead the SAP Diagnostics Agent to serve incorrect or malicious content to the server. If exploited, the attacker may compromise the confidentiality and availability of the application, posing significant risks to data integrity and operational effectiveness.",SAP,SAP Solution Manager (diagnostic Agent),7.2,HIGH,0.0008699999889358878,false,false,false,false,,false,false,2023-07-11T03:15:00.000Z,0 CVE-2023-36925,https://securityvulnerability.io/vulnerability/CVE-2023-36925,Unauthenticated blind SSRF in SAP Solution Manager (Diagnostics agent),"A vulnerability in the SAP Solution Manager's Diagnostics agent version 7.20 allows unauthenticated attackers to execute HTTP requests without authentication. This can lead to unauthorized commands being run against the system, potentially compromising the confidentiality and availability of the affected application and any connected systems that the Diagnostics agent has access to. Organizations using this product should be aware of the risks involved and implement necessary security measures to protect against unauthorized access.",SAP,SAP Solution Manager (diagnostics Agent),7.2,HIGH,0.0009500000160187483,false,false,false,false,,false,false,2023-07-11T03:15:00.000Z,0 CVE-2022-22544,https://securityvulnerability.io/vulnerability/CVE-2022-22544,,"Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing segregation of duty for the SAP Solution Manager administrator. Impacts of unauthorized execution of commands can lead to sensitive information disclosure, loss of system integrity and denial of service.",SAP,SAP Solution Manager (diagnostics Root Cause Analysis Tools),9.1,CRITICAL,0.0007999999797903001,false,false,false,false,,false,false,2022-02-09T22:05:29.000Z,0 CVE-2021-21483,https://securityvulnerability.io/vulnerability/CVE-2021-21483,,"Under certain conditions SAP Solution Manager, version - 720, allows a high privileged attacker to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application.",SAP,SAP Solution Manager,8.2,HIGH,0.0006500000017695129,false,false,false,false,,false,false,2021-04-13T18:39:17.000Z,0 CVE-2020-26836,https://securityvulnerability.io/vulnerability/CVE-2020-26836,,"SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.",SAP,SAP Solution Manager (trace Analysis),3.4,LOW,0.0010900000343099236,false,false,false,false,,false,false,2020-12-09T16:31:34.000Z,0 CVE-2020-26837,https://securityvulnerability.io/vulnerability/CVE-2020-26837,,"SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.",SAP,SAP Solution Manager (user Experience Monitoring),8.5,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2020-12-09T16:31:24.000Z,0 CVE-2020-26830,https://securityvulnerability.io/vulnerability/CVE-2020-26830,,"SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, does not perform necessary authorization checks for an authenticated user. Due to inadequate access control, a network attacker authenticated as a regular user can use operations which should be restricted to administrators. These operations can be used to Change the User Experience Monitoring configuration, obtain details about the configured SAP Solution Manager agents, Deploy a malicious User Experience Monitoring script.",SAP,SAP Solution Manager (user Experience Monitoring),7.6,HIGH,0.0008200000156648457,false,false,false,false,,false,false,2020-12-09T16:29:34.000Z,0 CVE-2020-26823,https://securityvulnerability.io/vulnerability/CVE-2020-26823,,"SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service.",SAP,SAP Solution Manager (java Stack),10,CRITICAL,0.0012400000123307109,false,false,false,false,,false,false,2020-11-10T16:17:49.000Z,0 CVE-2020-26821,https://securityvulnerability.io/vulnerability/CVE-2020-26821,,"SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service.",SAP,SAP Solution Manager (java Stack),10,CRITICAL,0.0012400000123307109,false,false,false,false,,false,false,2020-11-10T16:17:32.000Z,0 CVE-2020-26824,https://securityvulnerability.io/vulnerability/CVE-2020-26824,,"SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service.",SAP,SAP Solution Manager (java Stack),10,CRITICAL,0.0012400000123307109,false,false,false,false,,false,false,2020-11-10T16:16:44.000Z,0 CVE-2020-26822,https://securityvulnerability.io/vulnerability/CVE-2020-26822,,"SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service.",SAP,SAP Solution Manager (java Stack),10,CRITICAL,0.0012400000123307109,false,false,false,false,,false,false,2020-11-10T16:15:01.000Z,0 CVE-2020-6369,https://securityvulnerability.io/vulnerability/CVE-2020-6369,,"SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service.",SAP,Ca Introscope Enterprise Manager (affected Products: SAP Solution Manager And SAP Focused Run),7.5,HIGH,0.0020699999295175076,false,false,false,false,,false,false,2020-10-20T13:30:36.000Z,0 CVE-2020-6364,https://securityvulnerability.io/vulnerability/CVE-2020-6364,,"SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an attacker to modify a cookie in a way that OS commands can be executed and potentially gain control over the host running the CA Introscope Enterprise Manager,leading to Code Injection. With this, the attacker is able to read and modify all system files and also impact system availability.",SAP,SAP Solution Manager (ca Introscope Enterprise Manager) And SAP Focused Run (ca Introscope Enterprise Manager),10,CRITICAL,0.006479999981820583,false,false,false,true,true,false,false,2020-10-15T01:55:24.000Z,0 CVE-2020-6261,https://securityvulnerability.io/vulnerability/CVE-2020-6261,,"SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.",SAP,SAP Solution Manager (trace Analysis),5.3,MEDIUM,0.0007900000200606883,false,false,false,false,,false,false,2020-07-01T12:55:50.000Z,0 CVE-2020-6260,https://securityvulnerability.io/vulnerability/CVE-2020-6260,,"SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist.",SAP,SAP Solution Manager (trace Analysis),6.5,MEDIUM,0.0008999999845400453,false,false,false,false,,false,false,2020-06-10T12:44:06.000Z,0 CVE-2020-6271,https://securityvulnerability.io/vulnerability/CVE-2020-6271,,"SAP Solution Manager (Problem Context Manager), version 7.2, does not perform the necessary authentication, allowing an attacker to consume large amounts of memory, causing the system to crash and read restricted data (files visible for technical administration users of the diagnostics agent).",SAP,SAP Solution Manager (problem Context Manager),8.2,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2020-06-10T12:38:29.000Z,0 CVE-2020-6235,https://securityvulnerability.io/vulnerability/CVE-2020-6235,,"SAP Solution Manager (Diagnostics Agent), version 7.2, does not perform the authentication check for the functionalities of the Collector Simulator, leading to Missing Authentication.",SAP,SAP Solution Manager (diagnostics Agent),8.6,HIGH,0.0017800000496208668,false,false,false,false,,false,false,2020-04-14T18:36:26.000Z,0 CVE-2020-6207,https://securityvulnerability.io/vulnerability/CVE-2020-6207,,"SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.",SAP,SAP Solution Manager (user Experience Monitoring),10,CRITICAL,0.9730499982833862,true,false,false,true,true,false,false,2020-03-10T20:20:36.000Z,0 CVE-2020-6198,https://securityvulnerability.io/vulnerability/CVE-2020-6198,,"SAP Solution Manager (Diagnostics Agent), version 720, allows unencrypted connections from unauthenticated sources. This allows an attacker to control all remote functions on the Agent due to Missing Authentication Check.",SAP,SAP Solution Manager (diagnostics Agent),9.8,CRITICAL,0.0024399999529123306,false,false,false,false,,false,false,2020-03-10T20:18:20.000Z,0 CVE-2019-0307,https://securityvulnerability.io/vulnerability/CVE-2019-0307,,"Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker with admin privileges could gain access to the entire configuration, but no system sensitive information can be gained.",SAP,SAP Solution Manager(diagnostics Agent),2.4,LOW,0.00343999988399446,false,false,false,false,,false,false,2019-06-12T14:21:39.000Z,0 CVE-2019-0293,https://securityvulnerability.io/vulnerability/CVE-2019-0293,,"Read of RFC destination does not always perform necessary authorization checks, resulting in escalation of privileges to access information on RFC destinations on managed systems and SAP Solution Manager system (ST-PI, before versions 2008_1_700, 2008_1_710, and 740).",SAP,SAP Solution Manager System (st-pi),6.5,MEDIUM,0.0017600000137463212,false,false,false,false,,false,false,2019-05-14T20:21:40.000Z,0 CVE-2019-0291,https://securityvulnerability.io/vulnerability/CVE-2019-0291,,"Under certain conditions Solution Manager, version 7.2, allows an attacker to access information which would otherwise be restricted.",SAP,SAP Solution Manager,5.5,MEDIUM,0.0006699999794363976,false,false,false,false,,false,false,2019-05-14T20:21:14.000Z,0 CVE-2018-2405,https://securityvulnerability.io/vulnerability/CVE-2018-2405,,"SAP Solution Manager, 7.10, 7.20, Incident Management Work Center allows an attacker to upload a malicious script as an attachment and this could lead to possible Cross-Site Scripting.",SAP,SAP Solution Manager,5.4,MEDIUM,0.0007699999841861427,false,false,false,false,,false,false,2018-04-10T15:00:00.000Z,0 CVE-2018-2361,https://securityvulnerability.io/vulnerability/CVE-2018-2361,,"In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools.",SAP,SAP Solution Manager,8.8,HIGH,0.0024800000246614218,false,false,false,false,,false,false,2018-01-09T15:00:00.000Z,0