Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-0673PUBLISHED: 2023-02-04
A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The asso...
CVE-2023-0674PUBLISHED: 2023-02-04
A vulnerability, which was classified as problematic, has been found in XXL-JOB 2.3.1. Affected by this issue is some unknown functionality of the file /user/updatePwd of the component New Password Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Th...
CVE-2023-0675PUBLISHED: 2023-02-04
A vulnerability, which was classified as critical, was found in Calendar Event Management System 2.3.0. This affects an unknown part. The manipulation of the argument start/end leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and ma...
CVE-2018-25080PUBLISHED: 2023-02-04
A vulnerability, which was classified as problematic, has been found in MobileDetect 2.8.31. This issue affects the function initLayoutType of the file examples/session_example.php of the component Example. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The atta...
CVE-2019-25101PUBLISHED: 2023-02-04
A vulnerability classified as critical has been found in OnShift TurboGears 1.0.11.10. This affects an unknown part of the file turbogears/controllers.py of the component HTTP Header Handler. The manipulation leads to http response splitting. It is possible to initiate the attack remotely. Upgrading...
User Rank: Apprentice
10/12/2015 | 12:22:18 PM
"Yes" the App has to have mitigations for its vulnerabilities as they exist at the App level, but that is a far cry from actually securing the operating environment. And without securing the OS operation the App can be made to believe that anything is occurring (or not occurring) as desired to exploit a weakness in the system.
Security is a chain that has to have 'strong links' at every level.
There has been a marketing trend of late, claiming that "their product" can magically secure the operating environment by running it on your App. Managers love this type of easy solution; it is just a shame that they are largely ineffective, at best just securing some limited aspects of App operation. At worst they are a lot of 'security theater' and hand waving.
In my opinion, the best approach is a multi-layered solution with a hardware root of trust. The use of TrustZone is a good first step towards this, and with all the security company acquisitions that ARM is making lately apparently they must be headed in that direction as well.
Now all we have to do is to convince the OS manufacturers that security is important enough to us that they will then start to use some of these hardware security tools that are available to them.
Instead they are releasing "new features" like 'upper / lower case keyboards' and 'long press', as if these are some new revolutionary concepts. We need them to focus on the real issues, not the fluff.
Maybe voting with our wallets will get their attention.