Under certain conditions an authenticated attacker can get access to OS credentials. Getting access to OS credentials enables the malicious user to modify system data and make the system unavailable leading to high impact on confidentiality and low impact on integrity and availability of the application.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sap business objects business intelligence platform 430 |
||
sap business objects business intelligence platform 420 |