| 1 |
http://packetstormsecurity.com/files/129613/SAP-Business-Objects-Search-Token-Privilege-Escalation.html
|
|
|
| 2 |
http://packetstormsecurity.com/files/129613/SAP-Business-Objects-Search-Token-Privilege-Escalation.html
|
|
|
| 3 |
http://seclists.org/fulldisclosure/2014/Dec/60
|
|
|
| 4 |
http://seclists.org/fulldisclosure/2014/Dec/60
|
|
|
| 5 |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99607
|
|
|
| 6 |
https://exchange.xforce.ibmcloud.com/vulnerabilities/99607
|
|
|
| 7 |
https://www.onapsis.com/research/security-advisories/sap-business-objects-search-token-privilege-escalation-via-corba
|
|
|
| 8 |
https://www.onapsis.com/research/security-advisories/sap-business-objects-search-token-privilege-escalation-via-corba
|
|
|
| 9 |
https://www.securityfocus.com/archive/1/archive/1/534249/100/0/threaded
|
|
|
| 10 |
https://www.securityfocus.com/archive/1/archive/1/534249/100/0/threaded
|
|
|