Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Log4Shell - Wikipedia

    en.wikipedia.org/wiki/Log4Shell

    Log4Shell ( CVE-2021-44228) is a zero-day vulnerability in Log4j, a popular Java logging framework, involving arbitrary code execution. [2] [3] The vulnerability had existed unnoticed since 2013 and was privately disclosed to the Apache Software Foundation, of which Log4j is a project, by Chen Zhaojun of Alibaba Cloud 's security team on 24 ...

  3. Apache HTTP Server - Wikipedia

    en.wikipedia.org/wiki/Apache_HTTP_Server

    The Apache HTTP Server ( / əˈpætʃi / ə-PATCH-ee) is a free and open-source cross-platform web server software, released under the terms of Apache License 2.0. It is developed and maintained by a community of developers under the auspices of the Apache Software Foundation . The vast majority of Apache HTTP Server instances run on a Linux ...

  4. Shellshock (software bug) - Wikipedia

    en.wikipedia.org/wiki/Shellshock_(software_bug)

    Security documentation for the widely used Apache web server states: "CGI scripts can ... be extremely dangerous if they are not carefully checked," and other methods of handling web server requests are typically used instead. There are a number of online services which attempt to test the vulnerability against web servers exposed to the Internet.

  5. Slowloris (computer security) - Wikipedia

    en.wikipedia.org/wiki/Slowloris_(computer_security)

    In the Apache web server, a number of modules can be used to limit the damage caused by the Slowloris attack; the Apache modules mod_limitipconn, mod_qos, mod_evasive, mod security, mod_noloris, and mod_antiloris have all been suggested as means of reducing the likelihood of a successful Slowloris attack.

  6. ModSecurity - Wikipedia

    en.wikipedia.org/wiki/ModSecurity

    ModSecurity. ModSecurity, sometimes called Modsec, is an open-source web application firewall (WAF). Originally designed as a module for the Apache HTTP Server, it has evolved to provide an array of Hypertext Transfer Protocol request and response filtering capabilities along with other security features across a number of different platforms ...

  7. Directory traversal attack - Wikipedia

    en.wikipedia.org/wiki/Directory_traversal_attack

    This is specifically forbidden by the UTF-8 standard, but has still led to directory traversal vulnerabilities in software such as the IIS web server. Archives. Some archive formats like zip allow for directory traversal attacks: files in the archive can be written such that they overwrite files on the filesystem by backtracking. Code that ...

  8. HTTP parameter pollution - Wikipedia

    en.wikipedia.org/wiki/HTTP_parameter_pollution

    HTTP. HTTP Parameter Pollution ( HPP) is a web application vulnerability exploited by injecting encoded query string delimiters in already existing parameters. The vulnerability occurs if user input is not correctly encoded for output by a web application. [1] This vulnerability allows the injection of parameters into web application-created URLs.

  9. File inclusion vulnerability - Wikipedia

    en.wikipedia.org/wiki/File_inclusion_vulnerability

    File inclusion vulnerability. A file inclusion vulnerability is a type of web vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which ...