Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
More Reasons To Drop The War On Encryption
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
manchulaxmi
manchulaxmi,
User Rank: Apprentice
2/16/2016 | 3:48:40 AM
Re: Flash
really i appreciate your comments and nice post
raijakson
raijakson,
User Rank: Apprentice
2/15/2016 | 2:28:21 AM
Re: Flash
good post
Manyanti
Manyanti,
User Rank: Apprentice
2/12/2016 | 8:50:23 AM
Re: Flash
i appreciate your comments
Jamesbrownpal
Jamesbrownpal,
User Rank: Apprentice
2/4/2016 | 8:19:53 AM
Re: Pending Review
good information nice
Donniepal
Donniepal,
User Rank: Apprentice
2/1/2016 | 6:11:59 AM
Re: Pending Review
very good post nice
Griezmannpal
Griezmannpal,
User Rank: Apprentice
1/29/2016 | 8:20:15 AM
Re: Pending Review
GREAT INFORMATION
Benwatanabe
Benwatanabe,
User Rank: Apprentice
1/27/2016 | 6:24:44 AM
Re: Pending Review
nice post great one
Cameronpal
Cameronpal,
User Rank: Apprentice
1/25/2016 | 3:42:00 AM
Re: Pending Review
super nice post dis one
Nicholaspual
Nicholaspual,
User Rank: Apprentice
1/23/2016 | 8:23:02 AM
Re: Flash
Only peripheraly related to the topic of the post - why is a security blog still using Flash?
Doylelle
Doylelle,
User Rank: Apprentice
1/22/2016 | 6:53:35 AM
Re: Flash
nice post good information

 
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-4242
PUBLISHED: 2022-11-30
A vulnerability was found in Sapido BR270n, BRC76n, GR297 and RB1732 and classified as critical. Affected by this issue is some unknown functionality of the file ip/syscmd.htm. The manipulation leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the ...
CVE-2022-38801
PUBLISHED: 2022-11-30
In Zkteco BioTime < 8.5.3 Build:20200816.447, an employee can hijack an administrator session and cookies using blind cross-site scripting.
CVE-2022-38802
PUBLISHED: 2022-11-30
Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via resign, private message, manual log, time interval, attshift, and holiday. An authenticated administrator can read local files by exploiting XSS into a pdf generator when exporting data as a PDF
CVE-2022-38803
PUBLISHED: 2022-11-30
Zkteco BioTime < 8.5.3 Build:20200816.447 is vulnerable to Incorrect Access Control via Leave, overtime, Manual log. An authenticated employee can read local files by exploiting XSS into a pdf generator when exporting data as a PDF
CVE-2022-45842
PUBLISHED: 2022-11-30
Unauth. Race Condition vulnerability in WP ULike Plugin <= 4.6.4 on WordPress allows attackers to increase/decrease rating scores.