Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2390PUBLISHED: 2022-08-12
Apps developed with Google Play Services SDK incorrectly had the mutability flag set to PendingIntents that were passed to the Notification service. As Google Play services SDK is so widely used, this bug affects many applications. For an application affected, this bug will let the attacker, gain th...
CVE-2022-2503PUBLISHED: 2022-08-12
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear targe...
CVE-2022-2779PUBLISHED: 2022-08-12
A vulnerability classified as critical was found in SourceCodester Gas Agency Management System. Affected by this vulnerability is an unknown functionality of the file /gasmark/assets/myimages/oneWord.php. The manipulation of the argument shell leads to unrestricted upload. The attack can be launche...
CVE-2022-38179PUBLISHED: 2022-08-12JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack
CVE-2022-38180PUBLISHED: 2022-08-12In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases
User Rank: Author
6/22/2020 | 5:24:47 AM
Trust is absolutely crucial during this extraordinary period of business calibration, but trust in itself may not be enough at the moment, there needs to be more certainty. Every organisation has its own unique circumstances and while instincts tend to veer towards protection during periods of disruption, smart leaders will place equal emphasis on protection and growth.