{"id":7741,"date":"2020-01-11T19:35:35","date_gmt":"2020-01-12T02:35:35","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=7741"},"modified":"2023-02-14T18:32:01","modified_gmt":"2023-02-15T01:32:01","slug":"cve-2020-14723-oracle","status":"publish","type":"zerodays","link":"https:\/\/webdev.securin.xyz\/zerodays\/cve-2020-14723-oracle\/","title":{"rendered":"CVE-2020-14723 – Stored Cross-Site Scripting in Oracle"},"content":{"rendered":"
A cross-site scripting (XSS) attack causes arbitrary code (JavaScript) to run in a user\u2019s browser while the browser is connected to a trusted web site. The application targets the users\u00a0and it uses your application as a vehicle for the attack.<\/p>\n
<\/p>\n
*Affected Products:<\/strong> Oracle Help Technologies-UIX, Oracle Application Development Framework (ADF), Oracle’s Browser Look and Feel Plus (BLAF+), Oracle fusion middleware.<\/p>\n","protected":false},"featured_media":9983,"parent":0,"menu_order":0,"template":"","vulnerability_categories":[],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7741"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":8,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7741\/revisions"}],"predecessor-version":[{"id":14031,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7741\/revisions\/14031"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/9983"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7741"}],"wp:term":[{"taxonomy":"vulnerability_categories","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/vulnerability_categories?post=7741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}