cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-26836,https://securityvulnerability.io/vulnerability/CVE-2020-26836,,"SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.",SAP,SAP Solution Manager (trace Analysis),3.4,LOW,0.0010900000343099236,false,false,false,false,,false,false,2020-12-09T16:31:34.000Z,0 CVE-2020-6261,https://securityvulnerability.io/vulnerability/CVE-2020-6261,,"SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.",SAP,SAP Solution Manager (trace Analysis),5.3,MEDIUM,0.0007900000200606883,false,false,false,false,,false,false,2020-07-01T12:55:50.000Z,0 CVE-2020-6260,https://securityvulnerability.io/vulnerability/CVE-2020-6260,,"SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist.",SAP,SAP Solution Manager (trace Analysis),6.5,MEDIUM,0.0008999999845400453,false,false,false,false,,false,false,2020-06-10T12:44:06.000Z,0