Under certain conditions an authenticated attacker can get access to OS credentials. Getting access to OS credentials enables the attacker to modify system data and make the system unavailable leading to high impact on confidentiality and low impact on integrity and availability of the application.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Business_objects_business_intelligence_platform | Sap | 420 (including) | 420 (including) |
Business_objects_business_intelligence_platform | Sap | 430 (including) | 430 (including) |