Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-24065PUBLISHED: 2023-01-29
NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for ...
CVE-2023-0565PUBLISHED: 2023-01-29Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10.
CVE-2023-0566PUBLISHED: 2023-01-29Static Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.
CVE-2009-10003PUBLISHED: 2023-01-29
A vulnerability was found in capnsquarepants wordcraft up to 0.6. It has been classified as problematic. Affected is an unknown function of the file tag.php. The manipulation of the argument tag leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 0.7 is ...
CVE-2016-15022PUBLISHED: 2023-01-29
A vulnerability was found in mosbth cimage up to 0.7.18. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file check_system.php. The manipulation of the argument $_SERVER['SERVER_SOFTWARE'] leads to cross site scripting. The attack can be launche...
User Rank: Ninja
1/7/2016 | 3:27:10 PM
We both know any system designed to accessed CAN be accessed, so foolproof is impossible with enough inside knowledge. But if web apps hadn't moved away from these enterprise servers and compiled backend programs, we would not have the problems we have today. It was all about e-commerce on the cheap, convienence for users over security. Would the world really have been that bad if banks didn't connect their servers to the freaking internet? Or swiping a card thru a reader connected to a POS for approval connected without thinking thru the security behind it.