Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-25012PUBLISHED: 2023-02-02The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.
CVE-2022-37034PUBLISHED: 2023-02-01In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests.
CVE-2023-0599PUBLISHED: 2023-02-01
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metas...
CVE-2023-23750PUBLISHED: 2023-02-01An issue was discovered in Joomla! 4.0.0 through 4.2.6. A missing token check causes a CSRF vulnerability in the handling of post-installation messages.
CVE-2023-23751PUBLISHED: 2023-02-01An issue was discovered in Joomla! 4.0.0 through 4.2.4. A missing ACL check allows non super-admin users to access com_actionlogs.
User Rank: Ninja
12/29/2014 | 1:52:18 PM
What's most disturbing here is that we look to financial institutions as the "gold standard" for security.
@Kelly Your point is absolutely correct, there is no argument there. But I ask, was this assumption ever realistic and earned ? The Banks will argue they have a low rate of breeches Well what is that actually due to ? It has been implied that the financial industry was the best in this regard because after all - security is in their best interest.
And that is where the issue of security becomes blurred IMO. What is the business that Chase (in this case) is in ? It is not the security business nor altruism. It is deposits and profits. That is is all Chase and any other financial institution is concerned with because that is their business.
This issue of security, (oh well ) that is regulated by the Government, in this case the 3rd. party to absorb blame should something go wrong, Which ironically is needed because without it (Government) nothing would happen in a consistent way.
I refuse to see this latest "dropped security ball" from Chase, Sony ( and Target for that matter ) as purely a technical issue - that is too easy in my opinion. Nor ignore that this is a reflection of their culture and business practice in general. There is no shying away from this IMO.
The reactions of Chase ( the delayed announcement..etc) and Sony ( it's everyone's problem response) only underscore the fact that these companies are not in the business of security nor apparently in employing it effectively.