Critical
SAP
06/14/2021
Due to a missing authorization check in SAP Solution Manager LM-SERVICE component a remote authenticated attacker could be able to execute privileged actions in the affected system, including the…
Critical
SAP
06/14/2021
By abusing a Code Injection in SAP MII, an authenticated user with SAP XMII Developer privileges could execute code (including OS commands) on the server.
High
SAP
06/14/2021
Any authenticated user of the Solution Manager is able to craft/ upload and execute EEM scripts on the SMDAgents affecting its Integrity, Confidentiality and Availability.
Low
SAP
06/14/2021
Under certain circumstances, an attacker might be able to steal a cookie from the application. It may impact the confidentiality of the service.
Critical
SAP
03/19/2021
A malicious unauthenticated user could abuse the lack of authentication check on SAP Solution Manager User-Experience Monitoring web service, allowing them to remotely execute commands in all hosts…
Critical
SAP
03/19/2021
A malicious authenticated attacker could abuse some particular services exposed by the SAP JAVA Netweaver allowing them to execute commands in the underlying operating system.
High
SAP
03/19/2021
A malicious unauthenticated user could abuse the lack of authentication check on a particular web service exposed by default in SAP Netweaver JAVA stack, allowing them to fully compromise the…
High
03/19/2021
A malicious authenticated attacker, with privileges of SAP SMD Agent access, could abuse some SAP Host Control functions' lack of sanitization, in order to escalate its privileges and execute…
Low
SAP
07/29/2019
Please fill in the following form in order to download the selected Onapsis' resource. The system will send you a download link to your email.
High
Oracle
07/18/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by redirecting users to a malicious site.
High
Oracle
07/18/2018
By exploiting this vulnerability, a remote attacker could steal sensitive business information by targeting other users connected to the system.
High
SAP
06/14/2018
By exploiting this vulnerability, a remote attacker could access and modify any business information.