Описание
The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to access publication targets) to retrieve sensitive information that could then be used to gain additional access to downstream resources.
The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to access publication targets) to retrieve sensitive information that could then be used to gain additional access to downstream resources.
Связанные уязвимости
The vulnerability, if exploited, could allow an authenticated miscreant (with privileges to access publication targets) to retrieve sensitive information that could then be used to gain additional access to downstream resources.
Уязвимость программного обеспечения для интеграции данных PI Integrator for Business Analytics, связанная с раскрытием информации при передаче данных, позволяющая нарушителю получить несанкционированный доступ к защищенной информации