Vulnerability in the Hyperion BI+ product of Oracle Hyperion (component: IQR-Foundation service). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Hyperion BI+ accessible data. CVSS 3.1 Base Score 2.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).
References
Link | Resource |
---|---|
https://www.oracle.com/security-alerts/cpuoct2020.html | Patch Vendor Advisory |
https://www.oracle.com/security-alerts/cpuoct2020.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 05:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Vendor Advisory |
Information
Published : 2020-10-21 15:15
Updated : 2024-11-21 05:04
NVD link : CVE-2020-14770
Mitre link : CVE-2020-14770
CVE.ORG link : CVE-2020-14770
JSON object : View
Products Affected
oracle
- hyperion_bi\+
CWE