SAP BusinessObjects Business Intelligence
Platform allows an authenticated attacker to upload malicious code over the
network, that could be executed by the application. On successful exploitation,
the attacker can cause a low impact on the Integrity of the application.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Dec 2024 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 12 Sep 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap
Sap business Objects Business Intelligence Platform |
|
| CPEs | cpe:2.3:a:sap:business_objects_business_intelligence_platform:420:*:*:*:*:*:*:* cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:* cpe:2.3:a:sap:business_objects_business_intelligence_platform:440:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sap
Sap business Objects Business Intelligence Platform |
Tue, 13 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application. | |
| Title | Multiple Unrestricted File Upload vulnerabilities in SAP BusinessObjects Business Intelligence Platform | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published: 2024-08-13T04:03:26.192Z
Updated: 2024-12-10T06:22:12.114Z
Reserved: 2024-07-31T04:09:36.223Z
Link: CVE-2024-42375
Updated: 2024-08-13T14:31:57.365Z
Status : Modified
Published: 2024-08-13T04:15:10.567
Modified: 2024-12-10T07:15:06.303
Link: CVE-2024-42375
No data.