The Apache Software Foundation has resolved a critical vulnerability in its Apache HTTP Server, identified as CVE-2024-39884. This issue originated from a regression in Apache HTTP Server version 2.4.60, where handling legacy content-type configurations, such as "AddType," could unintentionally expose local content under specific conditions. This flaw might result in the inadvertent serving of source code from files meant for server-side processing, like PHP scripts. Alongside CVE-2024-39884, the update also addresses various other security vulnerabilities, including those that could lead to denial-of-service (DoS) attacks, remote code execution, and unauthorized access. The Apache Foundation strongly recommends that all users upgrade to version 2.4.61 immediately to mitigate these risks effectively. Taking this proactive step is essential to protect Apache HTTP Server deployments from potential exploitation and data breaches.
A buffer overflow vulnerability, critical in nature, has been encountered in the Net-SNMP trap daemon, snmptrapd. This kind of issue allows remote attackers to crash the service by...
A newly identified security flaw in Somalia’s electronic visa (e-visa) platform has raised serious concerns about the protection of traveler data. Investigations confirmed that t...
Shinhan Card, a major South Korea–based financial services provider, has confirmed a data breach that exposed personal information belonging to approximately 192,000 card merchan...