Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196PUBLISHED: 2023-05-26Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879PUBLISHED: 2023-05-26GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
User Rank: Apprentice
9/3/2020 | 9:11:02 PM
It is well known: whenever a skilled staff member leaves there are real costs to locating a replacement and training a replacement. Nothing new in this article on that front.
Listening to Twitter and another large closed info-sec email list, I'd say that the issues are more that there is a security skills shortage, little incentive to build secure systems, and a low/poor management committment to building securely coded solutions. Skill shortages are solvable by educating internal staff and then incentivizing them to do the right thing, security wise. Microsoft has proven this, as have other large firms. Something like 10-15 years ago they started making people actually be responsible for secure code.
The issue is that Sr Mgmt (C-X-O and A-VP and above) behave in a manner that protects their bonues because they are preassured by the market to "get it done and get it out", not "get it out, stable, and secure." Until the rest of the Fortune 1000 and Global 2K follow what MSFT did we will continue to battle.
Further - it is *well known* that money is reason #5 on the list. People fire managers, or companies long before dollars.
I have 15 years of sec-exp - most of the calls I get are temp 3-6 month short term at a pay rate around 60 - 80. Of the past 30 calls / inquiries in the past 60 days, only 3 were for positions equivalent to what I have on my resume - Director and above. The rest were not. Matter of fact, the best three interviews I've had in the past year came from personal 1:1 relationships.
I dropeed over 100 resumes where the PD/JD clearly matched up to the keywords in the article - I get maybe 10% engagement.
Go and listen to people applying for pen test jobs - people with a SANS certification or in some cases the OSCP. Employers run them through actual "hack this" tests, multiple times. I know a few who had to do 4 test events. It will run people ragged, esp. when the offers comes in a 50k-60k yr., in midwest metro markets.