Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...
User Rank: Ninja
5/29/2015 | 8:49:57 AM
over the yars PGP has been depreciated by its detractors as "too complex"
Complex systems such as PGP can be made usable by everyone -- just like a "smart phone" -- by means of packaged technology: wrapping the technology in an easy to use human interface -- often called a "GUI" -- or GUI Dialog
Roots
On paper we sign our name with pen&ink. and that signature is characterized by the individual signer,-- pretty hard to duplicate except by a highly skilled forger. even so, with Notaries or witnesses -- the pen& ink signature has been reliable for years.
but in our online digital networks -- whe have -- nothing
except that PGP has been available since the '90s -- and not adopted for general use due to opposition from interests opposed to privacy and security and such
we may now have reached a tipping point where we will have to admit our error and mend our ways
the key factor needed to implement PGP authentications is explanded authentications. Your PGP Public Key needs to be authenticated by a reliable party in order for your signatures to be recognized as valid. Keep these words in mind: In order for your signature to be recognized as valid. This also requires an assurance that YOU made the signature -- not a some scamster. This is possible with PGP because PGP provides both a Public and Private key for each user. The private key is required to make a signature while the public key is required to recognize(authenticate) a signature.
Exactly what we need!
The only issue is in getting the Public Keys authenticated. This should become a service offered by local Credit Unions and Banks. After you generate your key you take it to the Credit Union. They check your ID and then counter-sign it and upload it to the keyserver.
Now you will be able to authenticate your 1040, online banking, shopping &c
SSL/TLS is not acceptable: it is a half-baked system: The server is able to identify itself -- but not the client. Even the server's ID is questionable as the client has only marginal trust for x.509 certificates: he or she has NOT verified and countersigned the x.509 certificates he/she needs to use. This is what enables MITM attacks.