Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142PUBLISHED: 2023-03-27In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143PUBLISHED: 2023-03-27In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144PUBLISHED: 2023-03-27Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145PUBLISHED: 2023-03-27Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655PUBLISHED: 2023-03-27Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
User Rank: Ninja
9/14/2020 | 5:03:36 PM
Hmm, interesting, we were the ones who created ransomware and deployed it to other countries but it was not designed to be used for monetary purposes, it was called cryptoviral extortion. So let's be clear, we invented it - the question you have to ask yourself - if it was created at Columbia University, how did it happen to appear from other nation-states radar and how is it that other countries are attacking us using our own software program. They reversed engineered it and sent it back to us. This also happened with Stuxnet and NitroZeus.
But the conversation was not only just based on that, it also covered numerous programs that were getting out of hand, managed by people who got sloppy drunk over their power broker decisions. It never fails, General Alexander, Clapper, and now DHS's power-hungry leader. The funny thing is that they (Congress) tried to denounce Clapper and Alexander's decision but they were the one's who authorized it, basically to deploy and initiate cyber-warfare on nation-states (some of which were even our allies - France and England - they found us spying on prime-minister's cell phone and Video conferencing sessions, we found a way to hack their session, those video conferencing sessions were held on US soil - NY/US).
It is funny how we act like the victim when we are the one's causing the problems, another instance of "chickens coming home to roost", for some reason, this sounds familiar.
T