The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of SAP BusinessObjects

SAP: multiples vulnerabilities of April 2016
An attacker can use several vulnerabilities of SAP...
CVE-2016-4014, CVE-2016-4015, CVE-2016-4016, CVE-2016-4017, CVE-2016-4018, DOC-8218, ERPSCAN-16-019, ERPSCAN-16-020, ERPSCAN-16-021, VIGILANCE-VUL-19348
SAP: multiples vulnerabilities of October 2015
An attacker can use several vulnerabilities of SAP...
CVE-2015-7828, CVE-2015-7986, CVE-2015-7991, CVE-2015-7992, CVE-2015-7993, CVE-2015-7994, CVE-2015-8028, CVE-2015-8029, CVE-2015-8030, ERPSCAN-15-017, ERPSCAN-15-024, ERPSCAN-15-025, ONAPSIS-2015-024, ONAPSIS-2015-040, ONAPSIS-2015-041, ONAPSIS-2015-042, ONAPSIS-2015-043, ONAPSIS-2015-044, VIGILANCE-VUL-18084, ZDI-15-526, ZDI-15-527, ZDI-15-528, ZDI-15-529, ZDI-15-530, ZDI-15-531, ZDI-15-532
SAP: multiples vulnerabilities of January 2016
An attacker can use several vulnerabilities of SAP...
CVE-2016-1910, CVE-2016-1911, CVE-2016-1928, CVE-2016-1929, CVE-2016-7437, DOC-8218, ERPSCAN-15-024, ERPSCAN-16-001, ERPSCAN-16-002, ERPSCAN-16-003, ERPSCAN-16-004, ERPSCAN-16-005, ONAPSIS-2016-051, VIGILANCE-VUL-18691
SAP: multiple vulnerabilities of May 2015
An attacker can use several vulnerabilities of SAP...
CVE-2015-2278, CVE-2015-2282, CVE-2015-3994, CVE-2015-3995, CVE-2015-4091, CVE-2015-4092, CVE-2015-4157, CVE-2015-4158, CVE-2015-4159, CVE-2015-4160, CVE-2015-4161, CVE-2016-3946, DOC-8218, ONAPSIS-2015-006, ONAPSIS-2015-007, ONAPSIS-2016-001, VIGILANCE-VUL-16877
SAP: multiple vulnerabilities of April 2015
An attacker can use several vulnerabilities of SAP...
CVE-2015-3978, CVE-2015-3979, CVE-2015-3980, CVE-2015-3981, DOC-8218, VIGILANCE-VUL-16593
SAP BusinessObjects: privilege escalation via CORBA
A remote authenticated attacker can use CORBA of SAP BusinessObjects, in order to escalate his privileges...
2039905, CVE-2014-9320, DOC-8218, ONAPSIS-2014-034, VIGILANCE-VUL-15304
SAP: multiple vulnerabilities
An attacker can use several vulnerabilities of SAP...
CVE-2014-8659, CVE-2014-8660, CVE-2014-8661, CVE-2014-8662, CVE-2014-8663, CVE-2014-8664, CVE-2014-8665, CVE-2014-8666, CVE-2014-8667, CVE-2014-8668, CVE-2014-8669, DOC-8218, VIGILANCE-VUL-15471
SAP BusinessObjects: information disclosure via CORBA InfoStore
An attacker can use CORBA InfoStore of SAP BusinessObjects, in order to obtain sensitive information...
1998990, CVE-2014-8311, DOC-8218, ONAPSIS-2014-031, VIGILANCE-VUL-14864
SAP BusinessObjects: denial of service via CORBA OSCAFactory-Session
An attacker can use CORBA OSCAFactory::Session of SAP BusinessObjects, in order to trigger a denial of service...
2001106, CVE-2014-8310, DOC-8218, ONAPSIS-2014-030, VIGILANCE-VUL-14863
SAP BusinessObjects: information disclosure
An attacker can use SAP BusinessObjects, in order to obtain sensitive information...
2001109, CVE-2014-8309, DOC-8218, ONAPSIS-2014-029, VIGILANCE-VUL-14862
Our database contains other pages. You can request a free trial to read them.

Display information about SAP BusinessObjects: