Description
NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for health charting.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-28128 | NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for health charting. |
References
History
Fri, 28 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-28T15:34:17.348Z
Reserved: 2023-01-23T00:00:00.000Z
Link: CVE-2023-24065
Updated: 2024-08-02T10:49:08.881Z
Status : Modified
Published: 2023-01-29T22:15:09.047
Modified: 2025-03-28T16:15:26.640
Link: CVE-2023-24065
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD