There are five vulnerabilities fixed in the latest release of the Apache Web server, including a buffer overflow and several denial-of-service vulnerabilities. Fixes for these flaws have landed in the ...
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet. A compromised ...
The operators behind the highly adaptable RondoDox botnet campaign that kicked off in late March have proven to be ready to embrace the latest attack trends. Most recently, in December they began ...
Web applications often handle vast amounts of data, from personal user details to sensitive corporate information. As these applications grow in complexity and importance, they also become primary ...
Nginx 1.4.1 and 1.5.0 address a remote code execution flaw that could lead to compromised servers The development team behind the popular Nginx open-source Web server software released security ...
The Apache Software Foundation has released version 2.4.50 of the HTTP Web Server to address two vulnerabilities, one of which is an actively exploited path traversal and file disclosure flaw. The ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Apache HTTP Web Server users are being urged to update ...
Astra Vulnerability Scanner Review: How Good Is Astra? Your email has been sent Astra is one of the few security companies that combines automated and manual penetration testing (pentest) to create ...
Critical vulnerabilities in MySQL and database servers MariaDB and PerconaDB can lead to arbitrary code execution, root privilege escalation, and server compromise. Critical vulnerabilities in MySQL ...
As the ripples from the Shellshock vulnerability spread, an increasing number of problems are being found in the Bash shell, and those problems are being fixed. Apple got into the game with OS X Bash ...
A web application is any computer program that performs various functions using a web browser. It allows visitors to submit and acquire information from the internet. The modern day websites are way ...
The vulnerability assessment platform is one of the most realistic tools, but also one of the most dangerous, that CSO has ever reviewed. Sometimes the best defense is a good offense. That was the ...