Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196PUBLISHED: 2023-05-26Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879PUBLISHED: 2023-05-26GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
User Rank: Ninja
5/29/2015 | 8:49:57 AM
over the yars PGP has been depreciated by its detractors as "too complex"
Complex systems such as PGP can be made usable by everyone -- just like a "smart phone" -- by means of packaged technology: wrapping the technology in an easy to use human interface -- often called a "GUI" -- or GUI Dialog
Roots
On paper we sign our name with pen&ink. and that signature is characterized by the individual signer,-- pretty hard to duplicate except by a highly skilled forger. even so, with Notaries or witnesses -- the pen& ink signature has been reliable for years.
but in our online digital networks -- whe have -- nothing
except that PGP has been available since the '90s -- and not adopted for general use due to opposition from interests opposed to privacy and security and such
we may now have reached a tipping point where we will have to admit our error and mend our ways
the key factor needed to implement PGP authentications is explanded authentications. Your PGP Public Key needs to be authenticated by a reliable party in order for your signatures to be recognized as valid. Keep these words in mind: In order for your signature to be recognized as valid. This also requires an assurance that YOU made the signature -- not a some scamster. This is possible with PGP because PGP provides both a Public and Private key for each user. The private key is required to make a signature while the public key is required to recognize(authenticate) a signature.
Exactly what we need!
The only issue is in getting the Public Keys authenticated. This should become a service offered by local Credit Unions and Banks. After you generate your key you take it to the Credit Union. They check your ID and then counter-sign it and upload it to the keyserver.
Now you will be able to authenticate your 1040, online banking, shopping &c
SSL/TLS is not acceptable: it is a half-baked system: The server is able to identify itself -- but not the client. Even the server's ID is questionable as the client has only marginal trust for x.509 certificates: he or she has NOT verified and countersigned the x.509 certificates he/she needs to use. This is what enables MITM attacks.