Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196PUBLISHED: 2023-05-26Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879PUBLISHED: 2023-05-26GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
User Rank: Apprentice
3/17/2018 | 3:08:08 PM
First, anyone that has actuallty read the proposed legislation in 18 states would notice that the only information, firmware, parts, tools and diagnostics required are those ALREADY being provided to thousands of repair techs around the world. None of this information is secret, and most of it is arleady available illegally in asia. Legislation is carefully targeted for the sole purpose of allowing legal competition for repair services at the choice of the owner.
Even when the equipment being repaired is being used for a security function (such as a security camera), the application run on cpu within the camera is irrelevant to repair. The camera either passes a signal correctly or it does not. Someone has to repair the camera, and give it back to the owner. Its the owner that cares about his or her security -- and its still the owner that gets to decide whom to trust for repair.
If anyone has any doubts of the responsibility of the OEM to protect the security of the owner, just read the purchase contract closely, Every contract always dislaims responsibility for how equipment is used and carefull limits their risk and potential damages in that contract.
As to actual cyber risk -- equipnent is either secure by design, or insecure. Sadly, millions of IOT devices are being thrown into the marketplace with weak or absent security -- allowing botnets and other hacks to proliferate worldwide. These devices are already up and running and attached to a network, unlike devices which are broken and offline. Equipment under repair is among the most secure because its offline.
Opponents to Right to Repair have gleefully suggested that consumers will lose personal data without any explaination of how that might happen. We've yet to hear of anyone losing personal data as the result of an iPhone repair -- because Apple does an excellent job of security and encryption. Apple has even stated publically that despite their source code being posted on the internet, personal security was never at risk.
Happy to discuss any real examples of how repair as a business has made IOT devices less secure.