Tableau Server 2018.3.19

CPE Details

Tableau Server 2018.3.19
2018.3.19
2020-12-01
11h53 +00:00
2020-12-01
11h53 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:tableau:tableau_server:2018.3.19:*:*:*:*:*:*:*

Informations

Vendor

tableau

Product

tableau_server

Version

2018.3.19

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-6939 2020-11-23 15h16 +00:00 Tableau Server installations configured with Site-Specific SAML that allows the APIs to be used by unauthenticated users. If exploited, this could allow a malicious user to configure Site-Specific SAML settings and could lead to account takeover for users of that site. Tableau Server versions affected on both Windows and Linux are: 2018.2 through 2018.2.27, 2018.3 through 2018.3.24, 2019.1 through 2019.1.22, 2019.2 through 2019.2.18, 2019.3 through 2019.3.14, 2019.4 through 2019.4.13, 2020.1 through 2020.1.10, 2020.2 through 2020.2.7, and 2020.3 through 2020.3.2.
9.8
Critique
CVE-2020-6938 2020-07-08 13h02 +00:00 A sensitive information disclosure vulnerability in Tableau Server 10.5, 2018.x, 2019.x, 2020.x released before June 26, 2020, could allow access to sensitive information in log files.
7.5
Haute
CVE-2019-19719 2019-12-11 02h05 +00:00 Tableau Server 10.3 through 2019.4 on Windows and Linux allows XSS via the embeddedAuthRedirect page.
6.1
Moyen
CVE-2019-15637 2019-08-26 14h21 +00:00 Numerous Tableau products are vulnerable to XXE via a malicious workbook, extension, or data source, leading to information disclosure or a DoS. This affects Tableau Server, Tableau Desktop, Tableau Reader, and Tableau Public Desktop.
8.1
Haute