Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2094PUBLISHED: 2023-02-08The Yellow Yard Searchbar WordPress plugin before 2.8.2 does not escape some URL parameters before outputting them back to the user, leading to Reflected Cross-Site Scripting
CVE-2022-43761PUBLISHED: 2023-02-08Missing authentication when creating and managing the B&R APROL database in versions < R 4.2-07 allows reading and changing the system configuration.
CVE-2023-0740PUBLISHED: 2023-02-08Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
CVE-2023-0741PUBLISHED: 2023-02-08Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4.
CVE-2023-0742PUBLISHED: 2023-02-08Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
User Rank: Ninja
9/24/2014 | 2:11:55 AM
ISIS members have the real perception of the effects of a cyber attacks and how to conduct it. We must be prepared and evaluate carefully the real security level of our infrastructure, unfortunately many security researchers have demonstrated over the years that is too easy to locate over the internet a vulnerable system and exploit it in a cyber offensive.
Consider also that we are approaching cyber warfare matter, the conflicts are instantaneous in nature and asymmetric, impossible to predict and with objective difficulties for related attribution.
Never let the guard down ... the enemy is ready!