Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3317PUBLISHED: 2021-01-26KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512PUBLISHED: 2021-01-26The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165PUBLISHED: 2021-01-26SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
CVE-2021-1071PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...
User Rank: Ninja
8/7/2014 | 8:43:01 AM
Phil Zimmerman noted in his original work on PGP that where the operating software is compromised there can be no meaningful discussion of PGP -- (or any other app based security either)
liability has to apply to those who have control,-- each of us needs to look after the security in the code we control....
this has to start in the os. the os must be made such that it cannot be updated with un-authorized code and this has to be the responsibility of the os oem
applications then do the same but with the additional note that a zero-defects process has to be applied to incorporated software libraries. If I use a software library I am responsible for having checked the MD5, SHA-1, SHA-256, or PGP signature on the distribution before I install or use it.
remember: zero defects is something you DO -- not something you get. before i ship my code I will have to sign it, certifying that (a) I have checked the signature on incorporated libraries and (b) that I have not inclued anything maliscious in my code. and I take responsibility for the above.
audit processes -- SAP possibly -- could help me check my work.