Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-48285PUBLISHED: 2023-01-29loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.
CVE-2023-0564PUBLISHED: 2023-01-29Weak Password Requirements in GitHub repository froxlor/froxlor prior to 2.0.10.
CVE-2021-4315PUBLISHED: 2023-01-28
A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has be...
CVE-2023-0562PUBLISHED: 2023-01-28
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched re...
CVE-2023-0563PUBLISHED: 2023-01-28
A vulnerability classified as problematic has been found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file add-locker-form.php of the component Assign Locker. The manipulation of the argument ahname leads to cross site scripting. It is possible to initiate the...
User Rank: Ninja
1/9/2016 | 7:26:49 AM
that shouldn't be a problem except that the current masss distribution process for x.509 certificates does not provide the end user any means of selecting and validating certificates.
how many x.509 certs do you really need to validate?
credit union and an online shopping site ? tax provider ?
what's missing: a means for user to validate certificates
we need a key encryption key ( KEK ) device that can validate certificates . single purpose device.
you can't use your cell phone for this because on your cell you are installing apps from heaven knows where and giving them any permissions they ask for
KEK must be a single purpose device controlled only by the OEM