Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-20001PUBLISHED: 2021-03-07An issue was discovered in MantisBT before 2.24.5. It associates a unique cookie string with each user. This string is not reset upon logout (i.e., the user session is still considered valid and active), allowing an attacker who somehow gained access to a user's cookie to login as them.
CVE-2020-28466PUBLISHED: 2021-03-07
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened r...
CVE-2021-27364PUBLISHED: 2021-03-07An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
CVE-2021-27365PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length...
CVE-2021-27363PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system...
User Rank: Moderator
5/10/2019 | 1:52:23 PM
Kelly, if such a high percentage believe the Opposing Force has the edge, a repeatable solution has to be implemented to stave them off. Are these professionals in your article advocating change within their company or are they simply just dealing with it?
Of the 65% impeded by their jobs, what percentage have onboarded a junior security member? How many are willing to take on a junior member to mentor? Is it more productive to be tired and burned out as security professional or to be focused? How many have made an investment to aid in growth? I've read many articles similar to yours stating the same thing, but I've only read one this year where the writer proposed a solution. Here's my two cents.
Investing is done with a goal of receiving "something" in the near or distance future. Investing is intentional and planned. Investing is purposeful, planned and should be well executed. How many of the professionals surveyed are investing in an aspiring or junior security professional? "Nothing from nothing leaves nothing", no investing in the future means no return, therefore, no gain or in this case no progress in finding a solution to the frustration and burnout these professionals are experiencing.
As as an SME in my fields, in the military, I learned when and what to delegate. Without delegation being overworked, stressed and substandard performance are guaranteed. Delegation is not dumping your undesired tasks onto some else's plate, it's giving another individual the opportunity to learn, with oversight. Yes, you have will spend time training that individual and in the beginning your workload is increased, but in the end a professional is created and a more manageable workload surfaces. Oversimplified? Yes, it is, but it's a recipe for a beginning.
I was trained to find solutions to problems and that failure was not an option. This crisis in the making is manageable. Just my two cents.