Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142PUBLISHED: 2023-03-27In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143PUBLISHED: 2023-03-27In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144PUBLISHED: 2023-03-27Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145PUBLISHED: 2023-03-27Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655PUBLISHED: 2023-03-27Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
User Rank: Apprentice
11/3/2012 | 7:39:13 PM
Unlike many other biometrics, voice verification is a flexible technology that can be used-áin a text dependent or text independent fashion, presenting itself in a challenge response interface or operating in the background.-á-áLike other biometrics,-áit is a statistical process that results in a score as indicated in the article and-áhas been around a number of years.-á-áMany of the algorithms and research resides in the public domain and there are open source development environments.-á I do not agree that a company necesarily needs to engage with an expensive vendor as indicated.-á From my research and experience, I find that having a continuous good handle on your user set and biometric data is the key.-á-á
Once we go beyond a well defined user set, biometrics becomes-áone of the ultimate 'big data' applications in that we really only know how good the biometric is when we include all of the population.-á-áThis presents a challenge to performing all of the biometric processing on the mobile device since the biometric 'engine' will need to be updated over time as part of the biometric management application.
I have done an interesting biometrics TV series on biometrics in conjunction with NY Infragard.-á Some of the articles like, The Top 4 reasons to use Biometrics, are covered on the ibiometrics web-site blog.
Valene Skerpac, CISM, CISSP, PMP
Director, iBICS (iBiometrics, Inc.)