Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Solution_manager
(Sap)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 33 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-02-14 | CVE-2023-23852 | SAP Solution Manager (System Monitoring) - version 720, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | Solution_manager | 6.1 | ||
2023-02-14 | CVE-2023-23855 | SAP Solution Manager - version 720, allows an authenticated attacker to redirect users to a malicious site due to insufficient URL validation. A successful attack could lead an attacker to read or modify the information or expose the user to a phishing attack. As a result, it has a low impact to confidentiality, integrity and availability. | Solution_manager | 5.4 | ||
2023-03-14 | CVE-2023-27893 | An attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable. | Solution_manager | 8.8 | ||
2023-07-11 | CVE-2023-36921 | SAP Solution Manager (Diagnostics agent) - version 7.20, allows an attacker to tamper with headers in a client request. This misleads SAP Diagnostics Agent to serve poisoned content to the server. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application. | Solution_manager | 7.2 | ||
2023-07-11 | CVE-2023-36925 | SAP Solution Manager (Diagnostics agent) - version 7.20, allows an unauthenticated attacker to blindly execute HTTP requests. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application and other applications the Diagnostics Agent can reach. | Solution_manager | 7.2 | ||
2023-12-12 | CVE-2023-49587 | SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated function modules which can read or modify data of same or other component without user interaction over the network. | Solution_manager | 6.4 | ||
2018-04-10 | CVE-2018-2405 | SAP Solution Manager, 7.10, 7.20, Incident Management Work Center allows an attacker to upload a malicious script as an attachment and this could lead to possible Cross-Site Scripting. | Solution_manager | 5.4 | ||
2019-06-12 | CVE-2019-0307 | Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker with admin privileges could gain access to the entire configuration, but no system sensitive information can be gained. | Solution_manager | 2.4 | ||
2019-05-14 | CVE-2019-0291 | Under certain conditions Solution Manager, version 7.2, allows an attacker to access information which would otherwise be restricted. | Solution_manager | 5.5 | ||
2018-01-09 | CVE-2018-2361 | In SAP Solution Manager 7.20, the role SAP_BPO_CONFIG gives the Business Process Operations (BPO) configuration user more authorization than required for configuring the BPO tools. | Solution_manager | 8.8 |