What you need to know about the Bash “Shellshock” vulnerability
Although it can be exploited in some cases, the good news is that not all implementations can be exploited, and only certain services and applications allow a hacker to exploit this issue. Please see our article on Naked Security for an explanation of the vulnerability itself. In addition, we have examined our products and we are […]
What you need to know about the Bash “Shellshock” vulnerability Read More »