
CVE-2022-22544
https://notcve.org/view.php?id=CVE-2022-22544
09 Feb 2022 — Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing segregation of duty for the SAP Solution Manager administrator. Impacts of unauthorized execution of commands can lead to sensitive information disclosure, loss of system integrity and denial of service. Solution Manager (Diagnostics ... • https://launchpad.support.sap.com/#/notes/3140940 •

CVE-2021-21483
https://notcve.org/view.php?id=CVE-2021-21483
13 Apr 2021 — Under certain conditions SAP Solution Manager, version - 720, allows a high privileged attacker to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the application. Bajo determinadas condiciones, SAP Solution Manager, versión 720, permite a un atacante muy privilegiado conseguir acceso a información confidencial que tiene un impacto serio directo más allá del componente explotable, lo que afecta la confidencialida... • https://launchpad.support.sap.com/#/notes/3017823 •

CVE-2020-26836 – SAP Solution Manager 7.2 (ST 720) Open Redirection
https://notcve.org/view.php?id=CVE-2020-26836
09 Dec 2020 — SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack. SAP Solution Manager (Trace Analysis), versión 720, permite el uso inapropiado de un parámetro en la URL la aplic... • https://packetstorm.news/files/id/163136 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2020-26837 – SAP Solution Manager 7.2 File Disclosure / Denial of Service
https://notcve.org/view.php?id=CVE-2020-26837
09 Dec 2020 — SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable. SAP Solution Manager versión 7.2 (User Experience Monitoring), versión - 7.2, permite a un usuario a... • http://packetstormsecurity.com/files/163160/SAP-Solution-Manager-7.2-File-Disclosure-Denial-Of-Service.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2020-26830 – SAP Solution Manager 7.2 Missing Authorization
https://notcve.org/view.php?id=CVE-2020-26830
09 Dec 2020 — SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, does not perform necessary authorization checks for an authenticated user. Due to inadequate access control, a network attacker authenticated as a regular user can use operations which should be restricted to administrators. These operations can be used to Change the User Experience Monitoring configuration, obtain details about the configured SAP Solution Manager agents, Deploy a malicious User Experience Monitoring script. SAP Solution ... • http://packetstormsecurity.com/files/163161/SAP-Solution-Manager-7.2-Missing-Authorization.html • CWE-862: Missing Authorization •

CVE-2020-26823
https://notcve.org/view.php?id=CVE-2020-26823
10 Nov 2020 — SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service. SAP Solution Manager (JAVA stack), versión - 7.20, permite a un atacante no autenticado comprometer el sistema debido a una falta de comprobación de autorización en Upgrade Diagnostics Agent Connection Service, esto presenta un impacto en ... • https://launchpad.support.sap.com/#/notes/2985866 • CWE-306: Missing Authentication for Critical Function •

CVE-2020-26821
https://notcve.org/view.php?id=CVE-2020-26821
10 Nov 2020 — SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service. SAP Solution Manager (JAVA stack), versión - 7.20, permite a un atacante no autenticado comprometer el sistema debido a una falta de comprobación de autorización en SVG Converter Service, esto presenta un impacto en la integridad y disponibilidad del servicio • https://launchpad.support.sap.com/#/notes/2985866 • CWE-306: Missing Authentication for Critical Function •

CVE-2020-26824
https://notcve.org/view.php?id=CVE-2020-26824
10 Nov 2020 — SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service. SAP Solution Manager (JAVA stack), versión - 7.20, permite a un atacante no autenticado comprometer el sistema debido a una falta de comprobación de autorización en Upgrade Legacy Ports Service, esto presenta un impacto en la integridad y disponibilidad d... • https://launchpad.support.sap.com/#/notes/2985866 • CWE-306: Missing Authentication for Critical Function •

CVE-2020-26822
https://notcve.org/view.php?id=CVE-2020-26822
10 Nov 2020 — SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service. SAP Solution Manager (JAVA stack), versión - 7.20, permite a un atacante no autenticado comprometer el sistema debido a una falta de comprobación de autorización en Outside Discovery Configuration Service, esto presenta un impacto en la integri... • https://launchpad.support.sap.com/#/notes/2985866 • CWE-306: Missing Authentication for Critical Function •

CVE-2020-6369 – SAP Wily Introscope Enterprise Default Hard-Coded Credentials
https://notcve.org/view.php?id=CVE-2020-6369
20 Oct 2020 — SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service. SAP Solution Manager y SAP Focused Run (actualización provista en WILY_INTRO_ENTERPRISE versiones 9.7, 10.1, 10.5, 10.7), permite a atacantes no autenticados omitir la autenticación si el administrado... • http://packetstormsecurity.com/files/163159/SAP-Wily-Introscope-Enterprise-Default-Hard-Coded-Credentials.html •