Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown

CVE-2024-42375

Disclosure Date: August 13, 2024 (last updated December 10, 2024)
SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application.
Attacker Value
Unknown

CVE-2024-41731

Disclosure Date: August 13, 2024 (last updated December 10, 2024)
SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application.
Attacker Value
Unknown

CVE-2024-41730

Disclosure Date: August 13, 2024 (last updated September 13, 2024)
In SAP BusinessObjects Business Intelligence Platform, if Single Signed On is enabled on Enterprise authentication, an unauthorized user can get a logon token using a REST endpoint. The attacker can fully compromise the system resulting in High impact on confidentiality, integrity and availability.
Attacker Value
Unknown

CVE-2024-28166

Disclosure Date: August 13, 2024 (last updated December 10, 2024)
SAP BusinessObjects Business Intelligence Platform allows an authenticated attacker to upload malicious code over the network, that could be executed by the application. On successful exploitation, the attacker can cause a low impact on the Integrity of the application.
Attacker Value
Unknown

CVE-2023-42478

Disclosure Date: December 12, 2023 (last updated December 14, 2023)
SAP Business Objects Business Intelligence Platform is vulnerable to stored XSS allowing an attacker to upload agnostic documents in the system which when opened by any other user could lead to high impact on integrity of the application.
Attacker Value
Unknown

CVE-2023-25617

Disclosure Date: March 14, 2023 (last updated October 08, 2023)
SAP Business Object (Adaptive Job Server) - versions 420, 430, allows remote execution of arbitrary commands on Unix, when program objects execution is enabled, to authenticated users with scheduling rights, using the BI Launchpad, Central Management Console or a custom application based on the public java SDK. Programs could impact the confidentiality, integrity and availability of the system.
Attacker Value
Unknown

CVE-2023-25616

Disclosure Date: March 14, 2023 (last updated October 08, 2023)
In some scenario, SAP Business Objects Business Intelligence Platform (CMC) - versions 420, 430, Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileges. Successful attack could highly impact the confidentiality, Integrity, and Availability of the system.
Attacker Value
Unknown

CVE-2023-23856

Disclosure Date: February 14, 2023 (last updated November 08, 2023)
In SAP BusinessObjects Business Intelligence (Web Intelligence user interface) - version 430, some calls return json with wrong content type in the header of the response. As a result, a custom application that calls directly the jsp of Web Intelligence DHTML may be vulnerable to XSS attacks. On successful exploitation an attacker can cause a low impact on integrity of the application.
Attacker Value
Unknown

CVE-2022-41267

Disclosure Date: December 13, 2022 (last updated October 08, 2023)
SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing a high impact on confidentiality, integrity, and availability of the application.
Attacker Value
Unknown

CVE-2022-41263

Disclosure Date: December 12, 2022 (last updated October 08, 2023)
Due to a missing authentication check, SAP Business Objects Business Intelligence Platform (Web Intelligence) - versions 420, 430, allows an authenticated non-administrator attacker to modify the data source information for a document that is otherwise restricted. On successful exploitation, the attacker can modify information causing a limited impact on the integrity of the application.