What was unique about the Bash bug vulnerability?
What was unique about the Bash bug vulnerability? The flaw allows an attacker to remotely attach a malicious executable to a variable that is executed when Bash is invoked. In most of the examples on the Internet right now, attackers are remotely attacking web servers hosting CGI scripts that have been written in bash. What […]