A path traversal vulnerability in Apache HTTP Server 2.4.49 allows remote code execution by mapping URLs to files outside configured directories
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Path traversal | 5 Oct 202109:15 | – | prion |
![]() | Path traversal | 7 Oct 202116:15 | – | prion |
![]() | Exploit for Path Traversal in Apache Http Server | 9 Oct 202102:12 | – | githubexploit |
![]() | Exploit for Path Traversal in Apache Http Server | 17 Jun 202213:36 | – | githubexploit |
![]() | Exploit for Path Traversal in Apache Http Server | 15 Sep 202209:36 | – | githubexploit |
![]() | Exploit for Path Traversal in Apache Http Server | 6 Oct 202114:58 | – | githubexploit |
![]() | Exploit for Path Traversal in Apache Http Server | 14 Oct 202118:00 | – | githubexploit |
![]() | Exploit for Path Traversal in Apache Http Server | 6 Oct 202102:28 | – | githubexploit |
![]() | Exploit for Path Traversal in Apache Http Server | 3 Jun 202322:59 | – | githubexploit |
![]() | Exploit for Path Traversal in Apache Http Server | 15 Sep 202209:08 | – | githubexploit |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo