{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T09:10:05.234","vulnerabilities":[{"cve":{"id":"CVE-2024-41731","sourceIdentifier":"cna@sap.com","published":"2024-08-13T04:15:08.330","lastModified":"2024-12-10T07:15:06.187","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SAP BusinessObjects Business Intelligence\nPlatform allows an authenticated attacker to upload malicious code over the\nnetwork, that could be executed by the application. On successful exploitation,\nthe attacker can cause a low impact on the Integrity of the application."},{"lang":"es","value":"La plataforma SAP BusinessObjects Business Intelligence permite a un atacante autenticado cargar código malicioso a través de la red, que podría ser ejecutado por la aplicación. Si la explotación tiene éxito, el atacante puede causar un impacto bajo en la integridad de la aplicación."}],"metrics":{"cvssMetricV31":[{"source":"cna@sap.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":3.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"cna@sap.com","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:*","matchCriteriaId":"6EB0EFA3-8AD2-42F2-86E1-A62ECF8340E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:business_objects_business_intelligence_platform:440:*:*:*:*:*:*:*","matchCriteriaId":"AD397634-7D49-454E-9854-0A8212008655"},{"vulnerable":true,"criteria":"cpe:2.3:a:sap:business_objects_business_intelligence_platform:enterprise_420:*:*:*:*:*:*:*","matchCriteriaId":"029BEDE8-97DB-4716-8A5D-D7CC8049B93F"}]}]}],"references":[{"url":"https://me.sap.com/notes/3433545","source":"cna@sap.com","tags":["Permissions Required"]},{"url":"https://me.sap.com/notes/3515653","source":"cna@sap.com"},{"url":"https://url.sap/sapsecuritypatchday","source":"cna@sap.com","tags":["Vendor Advisory"]}]}}]}