SAP BusinessObjects Business Intelligence
Platform allows an authenticated attacker to upload malicious code over the
network, that could be executed by the application. On successful exploitation,
the attacker can cause a low impact on the Integrity of the application.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Dec 2024 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Sep 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap
Sap business Objects Business Intelligence Platform |
|
| CPEs | cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:* cpe:2.3:a:sap:business_objects_business_intelligence_platform:440:*:*:*:*:*:*:* cpe:2.3:a:sap:business_objects_business_intelligence_platform:enterprise_420:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sap
Sap business Objects Business Intelligence Platform |
Tue, 13 Aug 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application. | |
| Title | Multiple Unrestricted File Upload vulnerabilities in SAP BusinessObjects Business Intelligence Platform | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published: 2024-08-13T04:07:28.131Z
Updated: 2024-12-10T06:23:32.782Z
Reserved: 2024-07-22T08:06:52.675Z
Link: CVE-2024-41731
Updated: 2024-08-13T18:54:22.808Z
Status : Modified
Published: 2024-08-13T04:15:08.330
Modified: 2024-12-10T07:15:06.187
Link: CVE-2024-41731
No data.