Remote code execution flaw patched in Apache Kafka

Charlie Osborne – 15 February 2023 at 14:01 UTC Updated: 17 February 2023 at 11:07 UTC A critical vulnerability associated with remote code execution (RCE) and denial-of-service has been uncovered in Kafka Connect. UPDATE: The Apache Software Foundation (ASF) has addressed a vulnerability that can facilitate remote code execution (RCE) attacks through Kafka Connect. The…

Read More

HTTP request smuggling bug patched in HAProxy

Recent exploits have revealed potential vulnerabilities that may allow unauthorized access to backend servers. HAProxy, a widely used open source load balancer and reverse proxy, has addressed a vulnerability that could permit attackers to execute HTTP request smuggling attacks. By delivering a carefully crafted HTTP request, malicious actors could circumvent HAProxy’s filters, leading to unauthorized…

Read More

HTTP request smuggling bug patched in HAProxy

Recent vulnerabilities could give intruders access to backend servers. HAProxy, a well-known open source load balancer and reverse proxy, has corrected a vulnerability that could allow attackers to execute HTTP request smuggling attacks. An attacker could exploit this vulnerability by sending a specially crafted HTTP request, enabling them to circumvent HAProxy’s security filters and gain…

Read More

HTTP request smuggling bug patched in HAProxy

Recent exploitation techniques could allow attackers to gain access to backend servers. HAProxy, a widely used open source load balancer and reverse proxy, has addressed a vulnerability that could empower attackers to conduct HTTP request smuggling attacks. By carefully crafting an HTTP request, an attacker can potentially bypass HAProxy’s security measures, gaining unauthorized access to…

Read More

‘Most web API flaws are missed by standard security tests’ – Corey J Ball on securing a neglected attack vector

API security serves as an excellent entry point for those aspiring to embark on a career in penetration testing, as highlighted by an expert in the field. INTERVIEW – Protecting web APIs requires distinct strategies as conventional web application security approaches frequently overlook the prevalent vulnerabilities. According to Corey J Ball, an authority in API…

Read More

HTTP request smuggling bug patched in HAProxy

Vulnerabilities can lead to unauthorized access to backend servers. HAProxy, a widely used open-source load balancer and reverse proxy, has addressed a security vulnerability that allowed potential attackers to execute HTTP request smuggling attacks. An attacker could exploit this issue by sending a specially crafted HTTP request, evading HAProxy’s filters, and accessing backend servers without…

Read More

‘Most web API flaws are missed by standard security tests’ – Corey J Ball on securing a neglected attack vector

API security serves as an excellent entry point into a penetration testing career, as noted by an expert in the field. INTERVIEW: Securing web APIs demands a unique approach compared to traditional web application security, as standard tests often overlook prevalent vulnerabilities. According to API security specialist Corey J Ball, employing methods that are not…

Read More

‘Most web API flaws are missed by standard security tests’ – Corey J Ball on securing a neglected attack vector

API security serves as an excellent entry point into a penetration testing career, according to a field specialist. INTERVIEW Effective web API security demands a distinct strategy from traditional web application security, as standard testing methods often overlook pervasive vulnerabilities. This perspective comes from API security expert Corey J. Ball, who cautions that traditional assessment…

Read More

CVSS system criticized for failure to address real-world impact

JFrog advocates for a comprehensive overhaul of vulnerability risk metrics. ANALYSIS Recent research has underscored the weaknesses in the existing CVSS scoring system, pointing out that current metrics might contribute to “overhyping” certain vulnerabilities. The phenomenon of “overinflated” ratings can distract cybersecurity teams, causing them to prioritize issues that may not genuinely impact their organizations…

Read More
Back To Top