Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
COVID-19: Latest Security News & Commentary
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
jaxonburkitt
50%
50%
jaxonburkitt,
User Rank: Apprentice
5/4/2020 | 11:17:27 AM
Re: Effective Grouping
thanks
LucasNugan
50%
50%
LucasNugan,
User Rank: Apprentice
5/3/2020 | 11:17:03 PM
Re: Effective Grouping
Aggred 
LucasNugan
50%
50%
LucasNugan,
User Rank: Apprentice
5/3/2020 | 11:16:15 PM
Re: Effective Grouping
Agreed
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/30/2020 | 11:19:48 AM
Re: Effective Grouping
Agreed, however science and medicine isn't our only remedy. We need to make the hard choices and adhere to safety protocols as much as physically possible. I am still baffled at how many people are obstinant to these. By not adhering to them, it will just lengthen the amount of time that everyone is stuck in doors. 
hazelgarcia
50%
50%
hazelgarcia,
User Rank: Apprentice
4/27/2020 | 11:54:05 AM
Re: Effective Grouping
Nice
sbhilyrics
50%
50%
sbhilyrics,
User Rank: Apprentice
4/24/2020 | 9:20:03 AM
very nice article
thanks for sharing such great information with sbhilyrics.
Seotime
50%
50%
Seotime,
User Rank: Apprentice
4/15/2020 | 10:56:11 AM
Re: Effective Grouping
Hola que pasa???
zirkonyum
50%
50%
zirkonyum,
User Rank: Apprentice
4/7/2020 | 4:29:42 PM
Re: Effective Grouping

It's good to pray, but now we just have to believe in science
reformasbilbao
50%
50%
reformasbilbao,
User Rank: Apprentice
4/6/2020 | 8:25:01 PM
The virus
Here, in Bilbao We are reaching the peak, but until June we will probably not go outside
victoriano255
50%
50%
victoriano255,
User Rank: Apprentice
4/5/2020 | 4:12:14 AM
Re: Effective Grouping
The coronavirus has taken on a great deal. I pray to God that this disease can be cured soon.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/3/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-2196
PUBLISHED: 2020-06-03
Jenkins Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints, allowing attackers to perform all administrative actions provided by the plugin.
CVE-2020-2197
PUBLISHED: 2020-06-03
Jenkins Project Inheritance Plugin 19.08.02 and earlier does not require users to have Job/ExtendedRead permission to access Inheritance Project job configurations in XML format.
CVE-2020-2198
PUBLISHED: 2020-06-03
Jenkins Project Inheritance Plugin 19.08.02 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure.
CVE-2020-2199
PUBLISHED: 2020-06-03
Jenkins Subversion Partial Release Manager Plugin 1.0.1 and earlier does not escape the error message for the repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.
CVE-2020-2200
PUBLISHED: 2020-06-03
Jenkins Play Framework Plugin 1.0.2 and earlier lets users specify the path to the `play` command on the Jenkins master for a form validation endpoint, resulting in an OS command injection vulnerability exploitable by users able to store such a file on the Jenkins master.