Bash Vulnerability

What is Bash Vulnerability? Bash Vulnerability, or Shellshock, as the name suggests, attacks Bash which is used to execute scripts and commands by UNIX based systems. Bash is free and often used as the built in command line interface distributed with the Linux. Environment variables are defined in Bash along with the scripts and functions

CONTINUE READING …

Finding Security Vulnerabilities in Web Applications with Taint Analysis

Security vulnerabilities in Web applications such as SQL injections, cross-site scripting, and HTTP splitting attacks often stem from unchecked input, and also due to the vulnerabilities residing in Java libraries. In the past, studies had focused on guarding against problems caused by the unsafe nature of C, such as buffer overruns and format string vulnerabilities.

CONTINUE READING …

Zero day vulnerability management

With the use of big data in many firms the vulnerabilities, threats and the risk involved with the data also goes to an extended height. There are various system holes which give attackers an advent opportunity to infiltrate the corporate system and fetches out the confidential information of the firm. A zero-day attack is the

CONTINUE READING …