Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31104PUBLISHED: 2022-06-28
Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime's implementation of the SIMD proposal for WebAssembly on x86_64 contained two distinct bugs in the instruction lowerings implemented in Cranelift. The aarch64 implementation of the simd proposal is not affected. The bugs...
CVE-2022-34132PUBLISHED: 2022-06-28Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.
CVE-2022-34133PUBLISHED: 2022-06-28Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.
CVE-2022-34134PUBLISHED: 2022-06-28Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.
CVE-2022-31099PUBLISHED: 2022-06-27
rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a s...
User Rank: Apprentice
4/20/2014 | 6:50:04 PM
Passwords are the weak link to many things. How many people use that word for their password? I bet it's a pretty large number. That being said what else can we do? Finger prints maybe? I realize that's much easier said than done.