Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-43665PUBLISHED: 2023-02-02A denial of service vulnerability exists in the malware scan functionality of ESTsoft Alyac 2.5.8.645. A specially-crafted PE file can lead to killing target process. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2022-2546PUBLISHED: 2023-02-02
The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response tha...
CVE-2023-0400PUBLISHED: 2023-02-02
The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 corre...
CVE-2023-0637PUBLISHED: 2023-02-02
A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. This affects an unknown part of the file wan.asp of the component Web Management Interface. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been ...
CVE-2023-0638PUBLISHED: 2023-02-02
A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may b...
User Rank: Ninja
7/12/2012 | 5:42:54 PM
People
have to be aware of the digital identity that they already have on the web Furthermore
they need to be aware that your digital identity contains all your basic
information; comments, political views, personal views, employer, and family life.
Take for example your Facebook profile it contains name, location, birthday,
and places of study or employment. Kellerman makes a great point; this particular
group is using them to gain financial information, but what about this sort of
attack being used for something other than gaining financial information?-á LetGÇÖs hope that GÇÿblast phishingGÇÖ or GÇÿdynamite
phishing does not become an all too familiar term!
Is there any preventive measures
that user can take to help safeguard themselves against these sort of attacks
in the future?
Paul
Sprague
InformationWeek
Contributor