Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Profile for bongda389

bongda389
Member Since: June 19, 2020
Apprentice
Posts: 0

https://www.facebook.com/bongda389/
https://github.com/bongda3892019
https://www.instagram.com/bongda3892019/
https://www.linkedin.com/in/bongda389/
https://medium.com/@bongda3892019
https://www.pinterest.com/bongda3892019/
https://twitter.com/bongda389
https://wordpress.com/me
https://www.youtube.com/channel/UCU8tZJmhZVUtuWvL0kV8taQ
https://500px.com/bongda3892019
https://angel.co/bongda389-tran
https://www.behance.net/bongda3892019
https://www.blogger.com/u/4/blogger.g?blogID=4503123927619159926#allposts/src=sidebar
https://linkhay.com/u/bongda389

https://bongda3892019.business.site/

https://binhluantv.wordpress.com/

https://90mtv.wordpress.com/

https://www.facebook.com/bongda389/
   
   
   
   
   
   
   
   
   
   
https://github.com/bongda3892019
https://www.instagram.com/bongda3892019/
https://www.linkedin.com/in/bongda389/
   
https://www.pinterest.com/bongda3892019/
https://twitter.com/Bongda3892019
   
https://www.youtube.com/channel/UCU8tZJmhZVUtuWvL0kV8taQ
https://500px.com/bongda3892019
https://angel.co/bongda389-tran
https://www.behance.net/bongda3892019
https://www.blogger.com/u/4/blogger.g?blogID=4503123927619159926#allposts/src=sidebar
https://linkhay.com/u/bongda389
https://bongda3892019.business.site/
   
   
   
https://issuu.com/bongda389
   
https://bongda3892019.blogspot.com/
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
   
 
 
 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21742
PUBLISHED: 2021-09-25
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.
CVE-2020-20508
PUBLISHED: 2021-09-24
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
CVE-2020-20514
PUBLISHED: 2021-09-24
A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.
CVE-2016-6555
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in ver...
CVE-2016-6556
PUBLISHED: 2021-09-24
OpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This iss...