Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Spagobi
(Eng)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 8 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2025-01-21 | CVE-2024-54792 | A Cross-Site Request Forgery (CSRF) vulnerability has been found in SpagoBI v3.5.1 in the user administration panel. An authenticated user can lead another user into executing unwanted actions inside the application they are logged in, like adding, editing or deleting users. | Spagobi | N/A | ||
2025-01-21 | CVE-2024-54794 | The script input feature of SpagoBI 3.5.1 allows arbitrary code execution. | Spagobi | N/A | ||
2025-01-21 | CVE-2024-54795 | SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the create/edit forms of the worksheet designer function. | Spagobi | N/A | ||
2020-01-10 | CVE-2013-6231 | SpagoBI before 4.1 has Privilege Escalation via an error in the AdapterHTTP script | Spagobi | N/A | ||
2019-11-22 | CVE-2013-6234 | Unrestricted file upload vulnerability in the Worksheet designer in SpagoBI before 4.1 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, aka "XSS File Upload." | Spagobi | N/A | ||
2014-10-08 | CVE-2014-7296 | The default configuration in the accessibility engine in SpagoBI 5.0.0 does not set FEATURE_SECURE_PROCESSING, which allows remote authenticated users to execute arbitrary Java code via a crafted XSL document. | Spagobi | N/A | ||
2014-03-09 | CVE-2013-6233 | Cross-site scripting (XSS) vulnerability in SpagoBI before 4.1 allows remote authenticated users to inject arbitrary web script or HTML via the Description field in the "Short document metadata." | Spagobi | N/A | ||
2014-03-09 | CVE-2013-6232 | Cross-site scripting (XSS) vulnerability in SpagoBI before 4.1 allows remote authenticated users to inject arbitrary web script or HTML via a document note in the execution page. | Spagobi | N/A |