Tarbomb Denial of Service via Path Traversal

As software applications are built and developed over the years, engineering teams continuously shift perspective on what features to prioritize or de-prioritize. A feature developed five years ago may have no significance today. However, features deemed low priority may still be kept operational for legacy, compatibility, or business requirement reasons. Praetorian discovered such a legacy […]

The post Tarbomb Denial of Service via Path Traversal appeared first on Praetorian.

The post Tarbomb Denial of Service via Path Traversal appeared first on Security Boulevard.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top