Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by RyanSepe

RyanSepe
Member Since: March 27, 2014
Ninja
Posts: 1226

posted in June 2015

25 items
Comment: BACKUP! - RyanSepe - 6/30/2015
Comment: Re: Poking the Bear - RyanSepe - 6/30/2015
Comment: Need for a CISO - RyanSepe - 6/30/2015
Comment: Poking the Bear - RyanSepe - 6/30/2015
Comment: Re: Not Surprising - RyanSepe - 6/24/2015
Comment: Unfortunately True - RyanSepe - 6/24/2015
Comment: Not Surprising - RyanSepe - 6/24/2015
Comment: Ease of Use - RyanSepe - 6/24/2015
Comment: Re: Offline approach - RyanSepe - 6/17/2015
Comment: This looks great! - RyanSepe - 6/16/2015
Comment: Re: Offline approach - RyanSepe - 6/16/2015
Comment: Unfortunate - RyanSepe - 6/16/2015
Comment: Spokes of a Wheel - RyanSepe - 6/16/2015
Comment: Budget Constraints - RyanSepe - 6/12/2015
Comment: Ransomware - RyanSepe - 6/9/2015
Comment: Drawing Parallels - RyanSepe - 6/9/2015
Comment: Defense in Depth - RyanSepe - 6/8/2015
Comment: Re: Organized Crime - RyanSepe - 6/1/2015


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4019
PUBLISHED: 2020-06-01
The file editing functionality in the Atlassian Companion App before version 1.0.0 allows local attackers to have the app run a different executable in place of the app's cmd.exe via a untrusted search path vulnerability.
CVE-2020-4020
PUBLISHED: 2020-06-01
The file downloading functionality in the Atlassian Companion App before version 1.0.0 allows remote attackers, who control a Confluence Server instance that the Companion App is connected to, execute arbitrary .exe files via a Protection Mechanism Failure.
CVE-2020-4021
PUBLISHED: 2020-06-01
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.
CVE-2020-4023
PUBLISHED: 2020-06-01
The review coverage resource in Atlassian Fisheye and Crucible before version 4.8.2 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the committerFilter parameter.
CVE-2020-4013
PUBLISHED: 2020-06-01
The review resource in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to inject arbitrary HTML or Javascript via a cross site scripting (XSS) vulnerability through the review objectives.