Focused Run SAP Focused Run

Do you want an email whenever new security vulnerabilities are reported in SAP Focused Run?

By the Year

In 2024 there have been 0 vulnerabilities in SAP Focused Run . Focused Run did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 2 4.40
2021 1 6.50
2020 1 5.90
2019 0 0.00
2018 0 0.00

It may take a day or so for new Focused Run vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent SAP Focused Run Security Vulnerabilities

A highly privileged remote attacker

CVE-2022-27657 2.7 - Low - April 12, 2022

A highly privileged remote attacker, can gain unauthorized access to display contents of restricted directories by exploiting insufficient validation of path information in SAP Focused Run (Simple Diagnostics Agent 1.0) - version 1.0.

Directory traversal

The SAP Focused Run (Real User Monitoring) - versions 200

CVE-2022-24399 6.1 - Medium - March 10, 2022

The SAP Focused Run (Real User Monitoring) - versions 200, 300, REST service does not sufficiently sanitize the input name of the file using multipart/form-data, resulting in Cross-Site Scripting (XSS) vulnerability.

XSS

SAP Focused RUN versions 200, 300, does not perform necessary authorization checks for an authenticated user, which

CVE-2021-27609 6.5 - Medium - April 13, 2021

SAP Focused RUN versions 200, 300, does not perform necessary authorization checks for an authenticated user, which allows a user to call the oData service and manipulate the activation for the SAP EarlyWatch Alert service data collection and sending to SAP without the intended authorization.

AuthZ

SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7)

CVE-2020-6369 5.9 - Medium - October 20, 2020

SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for SAP Solution Manager or by SAP? Click the Watch button to subscribe.

SAP
Vendor

subscribe