SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application.
2024-08-13T04:15:10.567
2024-12-10T07:15:06.303
Modified
CVSSv3.1: 4.3 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | sap | business_objects_business_intelligence_platform | 420 | Yes |
Application | sap | business_objects_business_intelligence_platform | 430 | Yes |
Application | sap | business_objects_business_intelligence_platform | 440 | Yes |