Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Name that Toon: Risky Business
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 5 / 10   >   >>
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
9/29/2018 | 11:39:52 PM
ccj10
"Kathy, I think the better question is: Why can't you just mind your business?"
Joe Stanganelli
17%
83%
Joe Stanganelli,
User Rank: Ninja
9/29/2018 | 11:38:12 PM
ccj9
"IT told him he caught a virus. Now he's all anxious about post-nasal drip."
tuanthomson
20%
80%
tuanthomson,
User Rank: Apprentice
9/29/2018 | 8:45:42 AM
Funny
Looks like Harry found the honeypot.
Joe Stanganelli
40%
60%
Joe Stanganelli,
User Rank: Ninja
9/28/2018 | 12:50:31 PM
ccj8
"Tom prefers a top-down programming approach."
Joe Stanganelli
20%
80%
Joe Stanganelli,
User Rank: Ninja
9/28/2018 | 12:45:14 PM
ccj7
"On the count of three, we tickle."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
9/28/2018 | 12:43:52 PM
ccj6
"That's what happens when you use spaces instead of tabs, man."
Joe Stanganelli
25%
75%
Joe Stanganelli,
User Rank: Ninja
9/28/2018 | 12:42:47 PM
ccj5
"How much longer is that FTC regulator going to hang around?"
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
9/28/2018 | 12:41:17 PM
ccj4
"Guys, we need to have a talk about Casual Friday."
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
9/28/2018 | 12:39:22 PM
ccj3
"The stockholders wanted somebody to be strung up for the latest data breach..."
Joe Stanganelli
17%
83%
Joe Stanganelli,
User Rank: Ninja
9/28/2018 | 12:37:56 PM
ccj2
"Didn't you hear? The new policy is that if your app gets suspended, so do you."
<<   <   Page 5 / 10   >   >>


When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23836
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was identified in the prefs_smtp_psw HTTP request body parameter for the acp interface. An admin user can inject malicious client-side script into the affected parameter without any form of input sanitization. The...
CVE-2021-23837
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A time-based blind SQL injection was identified in the selected_folder HTTP request body parameter for the acp interface. The affected parameter (which retrieves the file contents of the specified folder) was found to be accepting malicious...
CVE-2021-23838
PUBLISHED: 2021-01-15
An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a malicious user...
CVE-2020-35581
PUBLISHED: 2021-01-15
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before 1.8.3.3 allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/admin-ajax.php request with the meta[title] parameter.
CVE-2020-35582
PUBLISHED: 2021-01-15
A stored cross-site scripting (XSS) issue in Envira Gallery Lite before 1.8.3.3 allows remote attackers to inject arbitrary JavaScript/HTML code via a POST /wp-admin/post.php request with the post_title parameter.