On Unix, SAP BusinessObjects Business
Intelligence Platform (Scheduling) allows an authenticated attacker with
administrator access on the local server to access the password of a local
account. As a result, an attacker can obtain non-administrative user
credentials, which will allow them to read or modify the remote server files.
Metrics
Affected Vendors & Products
References
History
Fri, 09 Aug 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sap
Sap businessobjects Business Intelligence Platform |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:sap:businessobjects_business_intelligence_platform:420:*:*:*:enterprise:*:*:* cpe:2.3:a:sap:businessobjects_business_intelligence_platform:430:*:*:*:*:*:*:* cpe:2.3:a:sap:businessobjects_business_intelligence_platform:440:*:*:*:*:*:*:* |
|
Vendors & Products |
Sap
Sap businessobjects Business Intelligence Platform |
MITRE
Status: PUBLISHED
Assigner: sap
Published: 2024-06-11T02:20:31.354Z
Updated: 2024-08-02T02:59:21.825Z
Reserved: 2024-05-07T05:46:11.657Z
Link: CVE-2024-34684
Vulnrichment
Updated: 2024-08-02T02:59:21.825Z
NVD
Status : Modified
Published: 2024-06-11T03:15:10.863
Modified: 2024-11-21T09:19:11.347
Link: CVE-2024-34684
Redhat
No data.