Exploit for Path Traversal in Apache HTTP Server allowing Remote Code Executio
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
The Hacker News | New Patch Released for Actively Exploited 0-Day Apache Path Traversal to RCE Attacks | 8 Oct 202104:47 | β | thn |
Fedora | [SECURITY] Fedora 34 Update: httpd-2.4.51-1.fc34 | 12 Oct 202123:46 | β | fedora |
Fedora | [SECURITY] Fedora 35 Update: httpd-2.4.51-2.fc35 | 15 Oct 202100:50 | β | fedora |
AlpineLinux | CVE-2021-41773 | 5 Oct 202109:15 | β | alpinelinux |
AlpineLinux | CVE-2021-42013 | 7 Oct 202116:15 | β | alpinelinux |
OpenVAS | Slackware: Security Advisory (SSA:2021-280-01) | 21 Apr 202200:00 | β | openvas |
OpenVAS | Fedora: Security Advisory for httpd (FEDORA-2021-aaf90ef84a) | 21 Oct 202100:00 | β | openvas |
OpenVAS | Fedora: Security Advisory for httpd (FEDORA-2021-2a10bc68a4) | 21 Oct 202100:00 | β | openvas |
OpenVAS | Apache HTTP Server 2.4.49 - 2.4.50 Directory Traversal / RCE Vulnerability - Windows | 8 Oct 202100:00 | β | openvas |
OpenVAS | Apache HTTP Server 2.4.49 - 2.4.50 Directory Traversal / RCE Vulnerability - Linux | 8 Oct 202100:00 | β | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo