Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2817PUBLISHED: 2022-08-15Use After Free in GitHub repository vim/vim prior to 9.0.0212.
CVE-2022-38357PUBLISHED: 2022-08-15Improper neutralization of special elements leaves the Eyes of Network Web application vulnerable to an iFrame injection attack, via the url parameter of /module/module_frame/index.php.
CVE-2022-38358PUBLISHED: 2022-08-15
Improper neutralization of input during web page generation leaves the Eyes of Network web application vulnerable to cross-site scripting attacks at /module/admin_notifiers/rules.php and /module/report_event/indext.php via the parameters rule_notification, rule_name, and rule_name_old, and at /modul...
CVE-2022-38359PUBLISHED: 2022-08-15
Cross-site request forgery attacks can be carried out against the Eyes of Network web application, due to an absence of adequate protections. An attacker can, for instance, delete the admin user by directing an authenticated user to the URL https://<target-address>/module/admin_user/index.php?...
CVE-2022-28756PUBLISHED: 2022-08-15The Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with version 5.7.3 and before 5.11.5 contains a vulnerability in the auto update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root.
User Rank: Apprentice
6/9/2012 | 8:50:52 PM
Using MD5 is a standard encryption process, salted hashes should have been implemented and would have made the decryption much more difficult. See the wikipedia article for more information.
What the hackers did is convert the hashed password back into the text password using various processes including rainbow tables.
A simple explanation is if I make a password of "2Paramount109"and convert it to an MD5 hash, I get a 16 byte string of Hexadecimal characters that are the same no matter what MD5 conversion I use.
If I now have a list of MD5 hashes, I can see which ones match a table of pre-converted passwords. These huge tables of pre-converted passwords are called rainbow tables and can be generated using software at home, or purchased online.
They didn't actually try different login / password combinations on the live website, which could have locked them out of the website.
References:
http://en.wikipedia.org/wiki/M...