B.A.S C2Box before 4.0.0 (r19171) relies on client-side validation, which allows remote attackers to "corrupt the business logic" via a negative value in an overdraft.
                
            References
                    | Link | Resource | 
|---|---|
| https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html | Exploit Third Party Advisory VDB Entry | 
| https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html | Exploit Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 02:31
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://packetstormsecurity.com/files/136450/C2Box-4.0.0-r19171-Validation-Bypass.html - Exploit, Third Party Advisory, VDB Entry | 
Information
                Published : 2017-01-23 21:59
Updated : 2025-04-20 01:37
NVD link : CVE-2015-4626
Mitre link : CVE-2015-4626
CVE.ORG link : CVE-2015-4626
JSON object : View
Products Affected
                treasuryxpress
- c2box
CWE
                
                    
                        
                        CWE-189
                        
            Numeric Errors
