Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2289PUBLISHED: 2022-07-03Use After Free in GitHub repository vim/vim prior to 9.0.
CVE-2022-2288PUBLISHED: 2022-07-03Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.
CVE-2022-2290PUBLISHED: 2022-07-03Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.
CVE-2022-2287PUBLISHED: 2022-07-02Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
CVE-2022-34911PUBLISHED: 2022-07-02
An issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1.37.x before 1.37.3, and 1.38.x before 1.38.1. XSS can occur in configurations that allow a JavaScript payload in a username. After account creation, when it sets the page title to "Welcome" followed by the username, the usern...
User Rank: Strategist
3/16/2015 | 8:29:35 PM
I have been trying to find out ways to prevent this. There is scant and conflicting evidence on a couple of sites. One site says it does not self-propogate between systems over the internet. It needs another program to send it, like a Trojan. I was also reading the infection rate is low so far.
Defense against ransomware in general:
1. Don't click on links in emails unless you expect that particular email, such as a confirmation to create an account.
2. Backup important data.
Another defense against most ransomware is antivirus software. However, as stated in this article, this particular one evades antivirus by changing itself every time it's copied, making it harder to detect.