Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Log4Shell - Wikipedia

    en.wikipedia.org/wiki/Log4Shell

    Log4Shell ( CVE-2021-44228) is a zero-day vulnerability in Log4j, a popular Java logging framework, involving arbitrary code execution. [2] [3] The vulnerability had existed unnoticed since 2013 and was privately disclosed to the Apache Software Foundation, of which Log4j is a project, by Chen Zhaojun of Alibaba Cloud 's security team on 24 ...

  3. Shellshock (software bug) - Wikipedia

    en.wikipedia.org/wiki/Shellshock_(software_bug)

    Security documentation for the widely used Apache web server states: "CGI scripts can ... be extremely dangerous if they are not carefully checked," and other methods of handling web server requests are typically used instead. There are a number of online services which attempt to test the vulnerability against web servers exposed to the Internet.

  4. ModSecurity - Wikipedia

    en.wikipedia.org/wiki/ModSecurity

    ModSecurity. ModSecurity, sometimes called Modsec, is an open-source web application firewall (WAF). Originally designed as a module for the Apache HTTP Server, it has evolved to provide an array of Hypertext Transfer Protocol request and response filtering capabilities along with other security features across a number of different platforms ...

  5. Apache HTTP Server - Wikipedia

    en.wikipedia.org/wiki/Apache_HTTP_Server

    The Apache HTTP Server ( / əˈpætʃi / ə-PATCH-ee) is a free and open-source cross-platform web server software, released under the terms of Apache License 2.0. It is developed and maintained by a community of developers under the auspices of the Apache Software Foundation . The vast majority of Apache HTTP Server instances run on a Linux ...

  6. Directory traversal attack - Wikipedia

    en.wikipedia.org/wiki/Directory_traversal_attack

    This is specifically forbidden by the UTF-8 standard, but has still led to directory traversal vulnerabilities in software such as the IIS web server. Archives. Some archive formats like zip allow for directory traversal attacks: files in the archive can be written such that they overwrite files on the filesystem by backtracking. Code that ...

  7. OWASP ZAP - Wikipedia

    en.wikipedia.org/wiki/OWASP_ZAP

    Website. www .zaproxy .org. ZAP (short for Zed Attack Proxy), formerly known as OWASP ZAP, is an open-source web application security scanner . It is intended to be used by both those new to application security as well as professional penetration testers. It has been one of the most active Open Worldwide Application Security Project ( OWASP ...

  8. Slowloris (computer security) - Wikipedia

    en.wikipedia.org/wiki/Slowloris_(computer_security)

    In the Apache web server, a number of modules can be used to limit the damage caused by the Slowloris attack; the Apache modules mod_limitipconn, mod_qos, mod_evasive, mod security, mod_noloris, and mod_antiloris have all been suggested as means of reducing the likelihood of a successful Slowloris attack.

  9. HTTP parameter pollution - Wikipedia

    en.wikipedia.org/wiki/HTTP_parameter_pollution

    HTTP. HTTP Parameter Pollution ( HPP) is a web application vulnerability exploited by injecting encoded query string delimiters in already existing parameters. The vulnerability occurs if user input is not correctly encoded for output by a web application. [1] This vulnerability allows the injection of parameters into web application-created URLs.