Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by macker490

macker490
Member Since: March 12, 2014
Ninja
Posts: 229

Most Recently Posted

100 items
Comment: response options - macker490 - 3/21/2018
Comment: 1.2m phishings - macker490 - 3/1/2017
Comment: authentication - macker490 - 2/28/2017
Comment: all of us suffer - macker490 - 2/10/2017
Comment: Excellent Essay - macker490 - 11/29/2016
Comment: good essay - macker490 - 10/19/2016
Comment: actual purpose - macker490 - 10/3/2016
Comment: two things - macker490 - 6/11/2016
Comment: ask the FBI - macker490 - 3/19/2016
Comment: Proper Perspective - macker490 - 2/15/2016
Comment: another new normal - macker490 - 1/9/2016
Comment: what have we learned - macker490 - 12/29/2015
Comment: Real Study - macker490 - 12/4/2015
Comment: Geekonomics - macker490 - 9/27/2015
Comment: Setting Duck - macker490 - 9/7/2015
Comment: symmetric keys - macker490 - 5/27/2015
Comment: White List Thinking - macker490 - 5/19/2015
Comment: Value in Balance - macker490 - 5/4/2015
Comment: Re: Training + - macker490 - 5/3/2015
Comment: excellent essay - macker490 - 4/20/2015
Comment: Tipping Point - macker490 - 3/23/2015
Comment: Let's get it right - macker490 - 2/27/2015
Comment: who is responsible? - macker490 - 1/17/2015
Comment: maybe. maybe not: - macker490 - 1/8/2015
Comment: "shaken" ? - macker490 - 12/9/2014
Comment: x.509 Galore - macker490 - 11/20/2014
Comment: Re: Two things,-- - macker490 - 11/20/2014
Comment: Two things,-- - macker490 - 11/20/2014
Comment: Foundations - macker490 - 11/1/2014
Comment: cart and horse - macker490 - 8/29/2014
Comment: Re: good topic - macker490 - 8/9/2014
Comment: good topic - macker490 - 8/7/2014
Comment: exploits - macker490 - 4/9/2014
Comment: Hardly Surprising - macker490 - 4/4/2014


Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-6017
PUBLISHED: 2020-12-03
Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long unreliable segments in function SNP_ReceiveUnreliableSegment() when configured to support plain-text messages, leading to a Heap-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code ...
CVE-2020-6021
PUBLISHED: 2020-12-03
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DL...
CVE-2020-6111
PUBLISHED: 2020-12-03
An exploitable denial-of-service vulnerability exists in the IPv4 functionality of Allen-Bradley MicroLogix 1100 Programmable Logic Controller Systems Series B FRN 16.000, Series B FRN 15.002, Series B FRN 15.000, Series B FRN 14.000, Series B FRN 13.000, Series B FRN 12.000, Series B FRN 11.000 and...
CVE-2020-5680
PUBLISHED: 2020-12-03
Improper input validation vulnerability in EC-CUBE versions from 3.0.5 to 3.0.18 allows a remote attacker to cause a denial-of-service (DoS) condition via unspecified vector.
CVE-2020-5638
PUBLISHED: 2020-12-03
Cross-site scripting vulnerability in desknet's NEO (desknet's NEO Small License V5.5 R1.5 and earlier, and desknet's NEO Enterprise License V5.5 R1.5 and earlier) allows remote attackers to inject arbitrary script via unspecified vectors.