Vulnerabilities (CVE)

Filtered by vendor Jedox Subscribe
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-47875 1 Jedox 2 Cloud, Jedox 2024-02-28 N/A 8.8 HIGH
A Directory Traversal vulnerability in /be/erpc.php in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to execute arbitrary code.
CVE-2022-47876 1 Jedox 1 Jedox 2024-02-28 N/A 8.8 HIGH
The integrator in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to create Jobs to execute arbitrary code via Groovy-scripts.
CVE-2022-47879 1 Jedox 2 Jedox, Jedox Cloud 2024-02-28 N/A 7.5 HIGH
A Remote Code Execution (RCE) vulnerability in /be/rpc.php in Jedox 2020.2.5 allows remote authenticated users to load arbitrary PHP classes from the 'rtn' directory and execute its methods.
CVE-2022-47880 1 Jedox 2 Jedox, Jedox Cloud 2024-02-28 N/A 5.3 MEDIUM
An Information disclosure vulnerability in /be/rpc.php in Jedox GmbH Jedox 2020.2.5 allow remote, authenticated users with permissions to modify database connections to disclose a connections' cleartext password via the 'test connection' function.
CVE-2022-47878 1 Jedox 1 Jedox 2024-02-28 N/A 8.8 HIGH
Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code.
CVE-2022-47874 1 Jedox 2 Cloud, Jedox 2024-02-28 N/A 6.5 MEDIUM
Improper Access Control in /tc/rpc in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to view details of database connections via class 'com.jedox.etl.mngr.Connections' and method 'getGlobalConnection'.
CVE-2022-47877 1 Jedox 1 Jedox 2024-02-28 N/A 5.4 MEDIUM
A Stored cross-site scripting vulnerability in Jedox 2020.2.5 allows remote, authenticated users to inject arbitrary web script or HTML in the Logs page via the log module 'log'.
CVE-2007-3581 1 Jedox 1 Palo 2024-02-28 5.0 MEDIUM N/A
The Jedox Palo 1.5 client transmits the password in cleartext, which might allow remote attackers to obtain the password by sniffing the network, as demonstrated by starting Excel with the Palo plugin, opening a cube, and performing an Insert View.