Vulnerabilities (CVE)

Filtered by vendor Sap Subscribe
Filtered by product Solution Manager
Total 33 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-6260 1 Sap 1 Solution Manager 2023-12-10 5.0 MEDIUM 5.3 MEDIUM
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to inject superflous data that can be displayed by the application, due to Incomplete XML Validation. The application shows additional data that do not actually exist.
CVE-2020-6261 1 Sap 1 Solution Manager 2023-12-10 5.0 MEDIUM 5.3 MEDIUM
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
CVE-2020-6271 1 Sap 1 Solution Manager 2023-12-10 5.5 MEDIUM 8.2 HIGH
SAP Solution Manager (Problem Context Manager), version 7.2, does not perform the necessary authentication, allowing an attacker to consume large amounts of memory, causing the system to crash and read restricted data (files visible for technical administration users of the diagnostics agent).
CVE-2020-6235 1 Sap 1 Solution Manager 2023-12-10 5.0 MEDIUM 8.6 HIGH
SAP Solution Manager (Diagnostics Agent), version 7.2, does not perform the authentication check for the functionalities of the Collector Simulator, leading to Missing Authentication.
CVE-2020-6198 1 Sap 1 Solution Manager 2023-12-10 7.5 HIGH 9.8 CRITICAL
SAP Solution Manager (Diagnostics Agent), version 720, allows unencrypted connections from unauthenticated sources. This allows an attacker to control all remote functions on the Agent due to Missing Authentication Check.
CVE-2020-6207 1 Sap 1 Solution Manager 2023-12-10 10.0 HIGH 9.8 CRITICAL
SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
CVE-2019-0307 1 Sap 1 Solution Manager 2023-12-10 2.7 LOW 2.4 LOW
Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker with admin privileges could gain access to the entire configuration, but no system sensitive information can be gained.
CVE-2019-0291 1 Sap 1 Solution Manager 2023-12-10 2.1 LOW 5.5 MEDIUM
Under certain conditions Solution Manager, version 7.2, allows an attacker to access information which would otherwise be restricted.
CVE-2018-2405 1 Sap 1 Solution Manager 2023-12-10 3.5 LOW 5.4 MEDIUM
SAP Solution Manager, 7.10, 7.20, Incident Management Work Center allows an attacker to upload a malicious script as an attachment and this could lead to possible Cross-Site Scripting.
CVE-2018-2361 1 Sap 1 Solution Manager 2023-12-10 6.5 MEDIUM 8.8 HIGH
In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools.
CVE-2016-10005 1 Sap 1 Solution Manager 2023-12-10 5.0 MEDIUM 7.5 HIGH
Webdynpro in SAP Solman 7.1 through 7.31 allows remote attackers to obtain sensitive information via webdynpro/dispatcher/sap.com/caf~eu~gp~example~timeoff~wd requests, aka SAP Security Note 2344524.
CVE-2013-7363 1 Sap 1 Solution Manager 2023-12-10 7.5 HIGH N/A
Unspecified vulnerability in the Diagnostics (SMD) agent in SAP Solution Manager allows remote attackers to obtain sensitive information, modify the configuration of applications, and install or remove applications via vectors involving the P4 protocol.
CVE-2014-5175 1 Sap 1 Solution Manager 2023-12-10 7.5 HIGH N/A
The License Measurement servlet in SAP Solution Manager 7.1 allows remote attackers to bypass authentication via unspecified vectors, related to a verb tampering attack and SAP_JTECHS.