Sos-berlin

Jobscheduler

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.24%
  • Veröffentlicht 13.07.2023 23:15:10
  • Zuletzt bearbeitet 21.11.2024 08:11:22

JS7 is an Open Source Job Scheduler. Users specify file names when uploading files holding user-generated documentation for JOC Cockpit. Specifically crafted file names allow an XSS attack to inject code that is executed with the browser. Risk of the...

  • EPSS 4.54%
  • Veröffentlicht 11.06.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:07

A vulnerability based on insecure user/password encryption in the JOE (job editor) component of SOS JobScheduler 1.12 and 1.13 allows attackers to decrypt the user/password that is optionally stored with a user's profile.

  • EPSS 0.49%
  • Veröffentlicht 06.02.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:36:18

A large or infinite loop vulnerability in the JOC Cockpit component of SOS JobScheduler 1.11 and 1.13.2 allows attackers to parameterize housekeeping jobs in a way that exhausts system resources and results in a denial of service.

  • EPSS 0.45%
  • Veröffentlicht 06.02.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:36:18

An XML External Entity (XEE) vulnerability exists in the JOC Cockpit component of SOS JobScheduler 1.12 and 1.13.2 allows attackers to read files from the server via an entity declaration in any of the XML documents that are used to specify the run-t...

  • EPSS 0.37%
  • Veröffentlicht 05.02.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:36:17

A cross-site scripting (XSS) vulnerability in the JOC Cockpit component of SOS JobScheduler 1.11 and 1.13.2 allows attackers to inject arbitrary web script or HTML via JSON properties available from the REST API.