Known Vulnerabilities for System Center Operations Manager by Microsoft

Listed below are 9 of the newest known vulnerabilities associated with the software "System Center Operations Manager" by "Microsoft".

These CVEs are retrieved based on exact matches on listed software and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-38649 Open Management Infrastructure Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38645, CVE-2021-38648... 7.8 - HIGH 2021-09-15 2021-09-26
CVE-2021-38648 Open Management Infrastructure Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38645, CVE-2021-38649... 7.8 - HIGH 2021-09-15 2021-09-26
CVE-2021-38647 Open Management Infrastructure Remote Code Execution Vulnerability 9.8 - CRITICAL 2021-09-15 2021-09-26
CVE-2021-38645 Open Management Infrastructure Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38648, CVE-2021-38649... 7.8 - HIGH 2021-09-15 2021-09-26
CVE-2021-1728 System Center Operations Manager Elevation of Privilege Vulnerability 8.8 - HIGH 2021-02-25 2021-03-03
CVE-2020-1331 A spoofing vulnerability exists when System Center Operations Manager (SCOM) does not properly sanitize a specially crafted w... 5.4 - MEDIUM 2020-06-09 2020-06-15
CVE-2015-2420 Cross-site scripting (XSS) vulnerability in Microsoft System Center 2012 Operations Manager Gold before Rollup 8, SP1 before ... 4.3 - MEDIUM 2015-08-15 2018-11-20
CVE-2013-0010 Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attacker... 4.3 - MEDIUM 2013-01-09 2018-10-12
CVE-2013-0009 Cross-site scripting (XSS) vulnerability in Microsoft System Center Operations Manager 2007 SP1 and R2 allows remote attacker... 4.3 - MEDIUM 2013-01-09 2018-10-12

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup10AllAll
ApplicationMicrosoftSystem Center Operations Manager2012rollup2AllAll
ApplicationMicrosoftSystem Center Operations Manager2012rollup3AllAll
ApplicationMicrosoftSystem Center Operations Manager2012rollup4AllAll
ApplicationMicrosoftSystem Center Operations Manager2012rollup5AllAll
ApplicationMicrosoftSystem Center Operations Manager2012rollup6AllAll
ApplicationMicrosoftSystem Center Operations Manager2012rollup7AllAll
ApplicationMicrosoftSystem Center Operations Manager2012rollup8AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup1AllAll
ApplicationMicrosoftSystem Center Operations Manager2012rollup1AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup2AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup3AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup4AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup5AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup6AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup7AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup8AllAll
ApplicationMicrosoftSystem Center Operations Manager2012sp1_rollup9AllAll
ApplicationMicrosoftSystem Center Operations Manager2012r2_rollup9AllAll
ApplicationMicrosoftSystem Center Operations Manager2012r2_rollup1AllAll

Popular searches for System Center Operations Manager

System Center 2019 - Datacenter Management | Microsoft

www.microsoft.com/en-us/system-center

System Center 2019 - Datacenter Management | Microsoft Z X VSimplify your datacenter and IT management for increased agility and performance with Microsoft System Center 2019.

www.microsoft.com/en-us/cloud-platform/system-center www.microsoft.com/cloud-platform/system-center www.microsoft.com/en-us/cloud-platform/system-center www.microsoft.com/en-us/cloud-platform/windows-server-2016 www.microsoft.com/en-us/cloud-platform/system-center-2016 www.microsoft.com/cloud-platform/system-center-2016 www.microsoft.com/system-center Microsoft Servers Data center Microsoft Windows Server Microsoft Azure Information technology Management Computing platform Software deployment Information technology management System integration Computer security Automation Programmer System Center Operations Manager Self-service Configuration management Microsoft Ignite Cloud computing Solution

Operations Manager

docs.microsoft.com/en-us/system-center/scom/welcome

Operations Manager E C AThis article is the main landing page for all content related to System Center 2016 - Operations Manager

docs.microsoft.com/en-us/system-center/scom/welcome?view=sc-om-2019 docs.microsoft.com/system-center/scom/welcome docs.microsoft.com/en-us/system-center/scom/welcome?view=sc-om-1807 technet.microsoft.com/en-us/library/hh212772.aspx docs.microsoft.com/en-us/system-center/scom/welcome?view=sc-om-1801 System Center Operations Manager Operations management Microsoft Servers Landing page Application software End-of-life (product) Data center Cloud computing Microsoft Docs Upgrade Software deployment Availability Documentation Terms of service Microsoft Network monitoring LinkedIn Information Twitter Bookmark (digital)

© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report