Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2846PUBLISHED: 2022-08-16
A vulnerability classified as problematic was found in Calendar Event Multi View Plugin. This vulnerability affects unknown code of the file /wp/?cpmvc_id=1&cpmvc_do_action=mvparse&f=datafeed&calid=1&month_index=1&method=adddetails&id=2. The manipulation leads to cross-site r...
CVE-2022-2847PUBLISHED: 2022-08-16
A vulnerability, which was classified as critical, has been found in SourceCodester Guest Management System. This issue affects some unknown processing of the file /guestmanagement/front.php. The manipulation of the argument rid leads to sql injection. The attack may be initiated remotely. The explo...
CVE-2021-39035PUBLISHED: 2022-08-16
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially lead...
CVE-2021-39085PUBLISHED: 2022-08-16
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the b...
CVE-2021-39086PUBLISHED: 2022-08-16
IBM Sterling File Gateway 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the syst...
User Rank: Strategist
1/21/2015 | 1:16:31 PM
Do you think the current software is adequate to protect our phones or do you think its lack of using antispyware and virus software on phones that is causing the issue? While there will always be user error in responding to scams, if phones were preloaded with protective software we may evade some of these issues.