News

Through the use of an automated testing toolkit, a team of South Korean academics has discovered 30 vulnerabilities in the file upload mechanisms used by 23 open-source web applications, forums ...
SPI Dynamics – Some of the most common and dangerous application security vulnerabilities that exist in ASP.NET Web-based applications come not from the C# or VB.NET code that make up its pages ...
A widely used plugin by Blueimp called jQuery File Upload contains a years-old vulnerability that potentially places 7,800 different software applications at risk for compromise and remote code ...
Web application vulnerabilities can be found in most frameworks such as Ruby on Rails, Django, PHP, etc. ... database keys, files, etc. In many cases this is accidental, ...
Riverbed Technology, whose products are used by most of the Global 500, patched vulnerabilities in its SteelCentral Portal used for critical application performance monitoring.
Wodify's gym management web application is used widely among CrossFit boxes in the US and other countries to help them grow. The software is in use at more than 5,000 gyms for things like class ...
For some Web applications, you may want to allow users to upload a file to your server. Expert Rob Shapland describes the dangers of a malicious file upload and suggests six steps you can take to ...
The unrestricted file upload flaw is likely being exploited by an initial access broker to deploy JSP web shells that grant full access to servers and allow installing additional malware payloads.
The vulnerability, tracked as CVE-2025-31324, is an unauthenticated file upload vulnerability in the Metadata Uploader component of the SAP NetWeaver Visual Composer Framework version 7.50. When ...
These first five Web.config vulnerabilities that we’ve discussed in this article have been applicable to all ASP.NET Web applications regardless of their methods of authentication, or even ...