Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-1851PUBLISHED: 2022-05-25Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
CVE-2022-29379PUBLISHED: 2022-05-25Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c.
CVE-2022-29650PUBLISHED: 2022-05-25Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the Search parameter at /online-food-order/food-search.php.
CVE-2022-29651PUBLISHED: 2022-05-25An arbitrary file upload vulnerability in the Select Image function of Online Food Ordering System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-26945PUBLISHED: 2022-05-25HashiCorp go-getter before 2.0.2 allows Command Injection.
User Rank: Apprentice
12/23/2013 | 6:48:16 PM
Of course all of these activities rarely require the full account info. Generally PCI requires truncation to store transactions but Target may have demonstrated a mitigating factor by encrypting all transactions. Thats why its probably an inside job... someone with access to the necessary decryption information.
Another article I read said the cvv codes were not stolen which meant the stolen accounts are not useful for most on-line purchases.
IMO ... regrdless of this article's title, we don't really know what happened yet.