Tag
#java
A vulnerability classified as problematic was found in Xuxueli xxl-job version 2.4.0. This vulnerability affects the function `deserialize` of the file `com/xxl/job/core/util/JdkSerializeTool.java` of the component `Template Handler`. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259480.
Unauthenticated attackers can exploit a weakness in the password reset functionality of the Visual Planning application in order to obtain access to arbitrary user accounts including administrators. In case administrative (in the context of Visual Planning) accounts are compromised, attackers can install malicious modules into the application to take over the application server hosting the Visual Planning application. All versions prior to Visual Planning 8 (Build 240207) are affected.
A wildcard injection inside a prepared SQL statement was found in an undocumented Visual Planning 8 REST API route. The combination of fuzzy matching (via LIKE operator) and user-controlled input allows exfiltrating the REST API key based on distinguishable server responses. If exploited, attackers are able to gain administrative access to the REST API version 2.0.
DerbyNet version 9.0 suffers from a cross site scripting vulnerability in playlist.php.
DerbyNet version 9.0 suffers from a cross site scripting vulnerability in racer-results.php.
DerbyNet version 9.0 suffers from a cross site scripting vulnerability in inc/kiosks.inc.
DerbyNet version 9.0 suffers from a cross site scripting vulnerability in photo-thumbs.php.
DerbyNet version 9.0 suffers from a cross site scripting vulnerability in checkin.php.
DerbyNet version 9.0 suffers from a cross site scripting vulnerability in photo.php.
Seo Panel version 4.7.0 suffers from a cross site scripting vulnerability.