Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Microsoft
  4. Power BI Report Server
  5. 15.0.1107.165

Known Vulnerabilities in Power BI Report Server 15.0.1107.165

Show more ↓
15.0.1117.98
15.0.1117.95
15.0.1116.121
15.0.1115.206
15.0.1115.194
15.0.1115.178
15.0.1115.165
15.0.1114.33
15.0.1113.169
15.0.1113.165
15.0.1113.162
15.0.1112.79
15.0.1112.48
15.0.1112.41
15.0.1111.115
15.0.1110.135
15.0.1110.120
15.0.1108.297
15.0.1108.159
15.0.1108.153
15.0.1107.166
15.0.1107.165
15.0.1107.146
15.0.1106.457
15.0.1106.169
15.0.1105.230
15.0.1105.195
15.0.1104.310
15.0.1104.300
15.0.1104.264
15.0.1104.239
15.0.1103.241
15.0.1103.234
15.0.1103.232
15.0.1103.227
15.0.1102.777
15.0.1102.759
15.0.1102.646
15.0.1102.620
15.0.1102.597
15.0.1102.371
15.0.1102.299
15.0.1102.235
15.0.1102.222
15.0.2.557
15.0.2.540
15.0.2.402
15.0.2.389
15.0.2.378
14.0.600.442
14.0.600.438
14.0.600.437
14.0.600.434
14.0.600.433
14.0.600.309
14.0.600.305
14.0.600.301
14.0.600.271
-



Spoofing attack in Power BI Report Server15 Feb, 2023
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: June 13, 2025
  • Coordinated brute-force campaign targets Apache Tomcat Manager interfaces
  • ConnectWise rotates digital certificates due to security risks
  • Major police crackdown takes down 20K malicious IPs and domains linked to info-stealers
  • DanaBot malware dismantled after major flaw exposed operation
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.