cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-26837,https://securityvulnerability.io/vulnerability/CVE-2020-26837,,"SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable.",SAP,SAP Solution Manager (user Experience Monitoring),8.5,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2020-12-09T16:31:24.000Z,0 CVE-2020-26830,https://securityvulnerability.io/vulnerability/CVE-2020-26830,,"SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, does not perform necessary authorization checks for an authenticated user. Due to inadequate access control, a network attacker authenticated as a regular user can use operations which should be restricted to administrators. These operations can be used to Change the User Experience Monitoring configuration, obtain details about the configured SAP Solution Manager agents, Deploy a malicious User Experience Monitoring script.",SAP,SAP Solution Manager (user Experience Monitoring),7.6,HIGH,0.0008200000156648457,false,false,false,false,,false,false,2020-12-09T16:29:34.000Z,0 CVE-2020-6207,https://securityvulnerability.io/vulnerability/CVE-2020-6207,,"SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.",SAP,SAP Solution Manager (user Experience Monitoring),10,CRITICAL,0.9730499982833862,true,false,false,true,true,false,false,2020-03-10T20:20:36.000Z,0