Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-0560PUBLISHED: 2023-01-28
A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. This issue affects some unknown processing of the file admin/practice_pdf.php. The manipulation of the argument id leads to sql injection. The attack may be initiated...
CVE-2023-0561PUBLISHED: 2023-01-28
A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file /user/s.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The expl...
CVE-2023-23628PUBLISHED: 2023-01-28
Metabase is an open source data analytics platform. Affected versions are subject to Exposure of Sensitive Information to an Unauthorized Actor. Sandboxed users shouldn't be able to view data about other Metabase users anywhere in the Metabase application. However, when a sandbox user views the sett...
CVE-2023-23629PUBLISHED: 2023-01-28
Metabase is an open source data analytics platform. Affected versions are subject to Improper Privilege Management. As intended, recipients of dashboards subscriptions can view the data as seen by the creator of that subscription. This allows someone with greater access to data to create a dashboard...
CVE-2023-23616PUBLISHED: 2023-01-28
Discourse is an open-source discussion platform. Prior to version 3.0.1 on the `stable` branch and 3.1.0.beta2 on the `beta` and `tests-passed` branches, when submitting a membership request, there is no character limit for the reason provided with the request. This could potentially allow a user to...
User Rank: Author
2/7/2019 | 8:58:37 AM
I submit to you that training and educating users so that they always make the right decision borders on utopia. It's sounds like a "checklist security strategy" and we all know how well that works. It's enough for example that one URL slips through the mental process, and WHAM...
I would offer that the concept should be not empowering humans here, but rather eliminating them from the equation. In other words isolating users from the risk vectors entirely if possible, rather than warning them abut them.
An example - complete Remote Browser isolation, rather than training users on how to identify malicious site/links/phishing attempts etc.
Makes sense?