Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31884PUBLISHED: 2022-06-28Marval MSM v14.19.0.12476 has an Improper Access Control vulnerability which allows a low privilege user to delete other users API Keys including high privilege and the Administrator users API Keys.
CVE-2022-31887PUBLISHED: 2022-06-28Marval MSM v14.19.0.12476 has a 0-Click Account Takeover vulnerability which allows an attacker to change any user's password in the organization, this means that the user can also escalate achieve Privilege Escalation by changing the administrator password.
CVE-2020-19896PUBLISHED: 2022-06-28File inclusion vulnerability in Minicms v1.9 allows remote attackers to execute arbitary PHP code via post-edit.php.
CVE-2020-19897PUBLISHED: 2022-06-28A reflected Cross Site Scripting (XSS) in wuzhicms v4.1.0 allows remote attackers to execute arbitrary web script or HTML via the imgurl parameter.
CVE-2021-41559PUBLISHED: 2022-06-28Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.
User Rank: Ninja
9/28/2014 | 12:48:25 PM
I know Apple hasn't had to deal with major vulnerabilities routinely in the past, but this isn't the way to address it. Apple should admit that all versions of OSX have the vulnerability but, users are not exposed unless they enable X, Y or Z. They shouldn't leave the subject up for debate by making a nebulous statement such as "systems are safe by default and not exposed to remote exploits of Bash unless users configure advanced UNIX services". This doesn't actually explain to users how they might currently be vulnerable, or what they may do for a work around.
Apple gets an F for this response in my book.