Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-22309PUBLISHED: 2022-05-24The POWER systems FSP is vulnerable to unauthenticated logins through the serial port/TTY interface. This vulnerability can be more critical if the serial port is connected to a serial-over-lan device. IBM X-Force ID: 217095.
CVE-2022-22495PUBLISHED: 2022-05-24IBM i 7.3, 7.4, and 7.5 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 226941.
CVE-2020-4926PUBLISHED: 2022-05-24A vulnerability in the Spectrum Scale 5.1 core component and IBM Elastic Storage System 6.1 could allow unauthorized access to user data or injection of arbitrary data in the communication protocol. IBM X-Force ID: 191600.
CVE-2013-10002PUBLISHED: 2022-05-24
A vulnerability was found in Telecommunication Software SAMwin Contact Center Suite 5.1. It has been rated as critical. Affected by this issue is the function getCurrentDBVersion in the library SAMwinLIBVB.dll of the credential handler. Authentication is possible with hard-coded credentials. Upgradi...
CVE-2013-10003PUBLISHED: 2022-05-24
A vulnerability classified as critical has been found in Telecommunication Software SAMwin Contact Center Suite 5.1. This affects the function getCurrentDBVersion in the library SAMwinLIBVB.dll of the database handler. The manipulation leads to sql injection. The exploit has been disclosed to the pu...
User Rank: Strategist
11/13/2014 | 9:31:01 AM
Software is traditionally one of the weakest points of security of any enterprise system so Google has their work cut out for them. There have been compromises of Wallet in the past. This article fails to compare the security between both solutions.