Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name That Toon: 'Tis the Season
Newest First  |  Oldest First  |  Threaded View
Page 1 / 5   >   >>
kpensacola
0%
100%
kpensacola,
User Rank: Apprentice
1/3/2018 | 1:44:23 PM
My late post
Jingle drones on about nothing as Santa dreams of off-season when nothing elf matters.
cacacloud
0%
100%
cacacloud,
User Rank: Apprentice
1/2/2018 | 11:35:47 AM
Re: Tis the Season
Rolf Harris caught wearing a Santa outfit.
JasonF217
0%
100%
JasonF217,
User Rank: Strategist
1/2/2018 | 11:27:26 AM
Tis the Season
We can make millions packaging a bunch of pieces of crap together into a new product!
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
12/31/2017 | 9:56:01 PM
5
"Not bad for a Monday Christmas!"
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
12/30/2017 | 10:27:06 PM
4
"On the bright side, I just caught a Mew!"
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
12/30/2017 | 10:24:43 PM
3
"It's the beta version. We'll sell the headsets with the upgrade."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
12/30/2017 | 10:23:52 PM
2
"Mrs. Claus, will you marry me?"
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
12/30/2017 | 10:21:53 PM
1
"We'll just make the same assumptions as every other tech company about VR adoption."
abby.ross
0%
100%
abby.ross,
User Rank: Strategist
12/27/2017 | 12:24:44 PM
Hey Santa, Here's your IoT device
Hey Santa, here's your IoT device. Hit this nail to monitor what the elves are doing. Hit this one to track Rudolph and the sleigh. Oh, and don't worry, I set your password. It's "Santa123456."
Mogden24
0%
100%
Mogden24,
User Rank: Guru
12/21/2017 | 3:50:44 PM
Caption Contest
Kim Jong-un and his Wanna Cry hackers won't see this coming. It's magic, Santa. Every time I hammer a nail in, a cybersecurity professional earns a white hat. 
Page 1 / 5   >   >>


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23369
PUBLISHED: 2021-05-10
In YzmCMS 5.6, XSS was discovered in member/member_content/init.html via the SRC attribute of an IFRAME element because of using UEditor 1.4.3.3.
CVE-2020-23370
PUBLISHED: 2021-05-10
In YzmCMS 5.6, stored XSS exists via the common/static/plugin/ueditor/1.4.3.3/php/controller.php action parameter, which allows remote attackers to upload a swf file. The swf file can be injected with arbitrary web script or HTML.
CVE-2020-23371
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in static/admin/js/kindeditor/plugins/multiimage/images/swfupload.swf in noneCms v1.3.0 allows remote attackers to inject arbitrary web script or HTML via the movieName parameter.
CVE-2020-23373
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in admin/nav/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.
CVE-2020-23374
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in admin/article/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.