Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-37452PUBLISHED: 2022-08-07Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
CVE-2022-26979PUBLISHED: 2022-08-06Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow a NULL pointer dereference when this.Span is used for oState of Collab.addStateModel, because this.Span.text can be NULL.
CVE-2022-27944PUBLISHED: 2022-08-06Foxit PDF Reader before 12.0.1 and PDF Editor before 12.0.1 allow an exportXFAData NULL pointer dereference.
CVE-2022-2688PUBLISHED: 2022-08-06
A vulnerability was found in SourceCodester Expense Management System. It has been rated as critical. This issue affects the function fetch_report_credit of the file report.php of the component POST Parameter Handler. The manipulation of the argument from/to leads to sql injection. The attack may be...
CVE-2022-2689PUBLISHED: 2022-08-06
A vulnerability classified as problematic has been found in SourceCodester Wedding Hall Booking System. Affected is an unknown function of the file /whbs/?page=contact_us of the component Contact Page. The manipulation of the argument Message leads to cross site scripting. It is possible to launch t...
User Rank: Ninja
3/17/2013 | 1:03:04 AM
It is funny how quick
one will turn when faced when jail time. I think that SabuGÇÖs biggest contributions
to the Feds were not the people he rolled on, but exposing the unknown
vulnerabilities, and eliminating those threats. I like how it was pointed out
that it is individuals and not computers that are responsible for these
attacks. I believe that people associate computers with threats and vulnerabilities,
although responsible for some security flaws, it is the intent of a individual behind
the attacks. I understand that the Feds are responsible for arresting these
hackers, but it would have been nice to know they caught them through forensics
and not handed to them. That would have given me confidence in our defense,
actually catching them by detecting and investigating then tracing these attacks
to the individuals.
Paul Sprague
InformationWeek Contributor
-á