Логотип exploitDog
bind:CVE-2020-6208
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-6208

Количество 3

Количество 3

nvd логотип

CVE-2020-6208

почти 6 лет назад

SAP Business Objects Business Intelligence Platform (Crystal Reports), versions- 4.1, 4.2, allows an attacker with basic authorization to inject code that can be executed by the application and thus allowing the attacker to control the behaviour of the application, leading to Remote Code Execution. Although the mode of attack is only Local, multiple applications can be impacted as a result of the vulnerability.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-j37h-pxr7-r959

больше 3 лет назад

SAP Business Objects Business Intelligence Platform (Crystal Reports), versions- 4.1, 4.2, allows an attacker with basic authorization to inject code that can be executed by the application and thus allowing the attacker to control the behaviour of the application, leading to Remote Code Execution. Although the mode of attack is only Local, multiple applications can be impacted as a result of the vulnerability.

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2020-02862

почти 6 лет назад

Уязвимость платформы бизнес-аналитики SAP Business Objects Business Intelligence Platform, связанная с ошибками управления генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-6208

SAP Business Objects Business Intelligence Platform (Crystal Reports), versions- 4.1, 4.2, allows an attacker with basic authorization to inject code that can be executed by the application and thus allowing the attacker to control the behaviour of the application, leading to Remote Code Execution. Although the mode of attack is only Local, multiple applications can be impacted as a result of the vulnerability.

CVSS3: 8.2
3%
Низкий
почти 6 лет назад
github логотип
GHSA-j37h-pxr7-r959

SAP Business Objects Business Intelligence Platform (Crystal Reports), versions- 4.1, 4.2, allows an attacker with basic authorization to inject code that can be executed by the application and thus allowing the attacker to control the behaviour of the application, leading to Remote Code Execution. Although the mode of attack is only Local, multiple applications can be impacted as a result of the vulnerability.

CVSS3: 8.2
3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02862

Уязвимость платформы бизнес-аналитики SAP Business Objects Business Intelligence Platform, связанная с ошибками управления генерацией кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.5
3%
Низкий
почти 6 лет назад

Уязвимостей на страницу