Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196PUBLISHED: 2023-05-26Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879PUBLISHED: 2023-05-26GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
User Rank: Ninja
7/25/2019 | 9:48:39 PM
Since this 2017 commission was created and now it is 2019, why didn't the government institute a proxy and email filtering system that identifies the type of traffic going in and out of their network? The traffic should go to a SOC or central distribution center, from there, traffic should be filtered in and out of the network using NGFW, Proxies and NAC devices. If they centralized this traffic, then the threat would have been identified ahead of time due to well-trained professionals reviewing those external threats or so you hope.
This is an interesting comment if the schools think they have not been compromised, then why is the FBI in the building, obviously, there is something because they initiated a "State of Emergency", that means there is a fire (metaphorically speaking).
Also, if Lousiana put together a "Cybersecurity Commission" in 2017, why are we having this discussion because they should have controls in place or at least a framework to address some of these issues (where is the assessment, compliance, and risk management framework)? Also, why didn't the schools have an external group monitoring traffic going in and out of the network (i.e. SOC).
The feds have a forensics division and analysts that will be able to address where the hack originated from, they just have to determine the culprit, where it originated and gather evidence to make their indictment stick.
Only time will tell.
T