SAP BusinessObjects Business Intelligence
Platform allows an authenticated attacker to upload malicious code over the
network, that could be executed by the application. On successful
exploitation, the attacker can cause a low impact on the Integrity of the
application.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Dec 2024 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 16 Sep 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap
Sap business Objects Business Intelligence Platform |
|
| CPEs | cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:* cpe:2.3:a:sap:business_objects_business_intelligence_platform:440:*:*:*:*:*:*:* cpe:2.3:a:sap:business_objects_business_intelligence_platform:enterprise_420:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sap
Sap business Objects Business Intelligence Platform |
Tue, 13 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application. | |
| Title | Multiple Unrestricted File Upload vulnerabilities in SAP BusinessObjects Business Intelligence Platform | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published: 2024-08-13T04:05:24.442Z
Updated: 2024-12-10T06:22:53.694Z
Reserved: 2024-03-06T06:12:27.005Z
Link: CVE-2024-28166
Updated: 2024-08-13T13:54:14.965Z
Status : Modified
Published: 2024-08-13T04:15:06.867
Modified: 2024-12-10T07:15:04.890
Link: CVE-2024-28166
No data.