Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2390PUBLISHED: 2022-08-12
Apps developed with Google Play Services SDK incorrectly had the mutability flag set to PendingIntents that were passed to the Notification service. As Google Play services SDK is so widely used, this bug affects many applications. For an application affected, this bug will let the attacker, gain th...
CVE-2022-2503PUBLISHED: 2022-08-12
Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear targe...
CVE-2022-2779PUBLISHED: 2022-08-12
A vulnerability classified as critical was found in SourceCodester Gas Agency Management System. Affected by this vulnerability is an unknown functionality of the file /gasmark/assets/myimages/oneWord.php. The manipulation of the argument shell leads to unrestricted upload. The attack can be launche...
CVE-2022-38179PUBLISHED: 2022-08-12JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack
CVE-2022-38180PUBLISHED: 2022-08-12In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases
User Rank: Apprentice
5/7/2014 | 5:05:51 AM
When you have access to the antivirus software, you have full admin access to the whole computer : files, network, USB, ...
Antivirus software watches all processes on the computer but nobody watches antivirus software ..
Antivirus software can read file and send data to distant server.
Users cannot distinct normal antivirus scan process and updates and data spying ...