One Article Review

Accueil - L'article:
Source ZDNet.webp ZD Net
Identifiant 3477319
Date de publication 2021-10-06 12:03:29 (vue: 2021-10-06 13:06:15)
Titre Apache HTTP Server Project patches exploited zero-day vulnerability (Recyclage)
Texte The critical vulnerability is being actively exploited in the wild.
Envoyé Oui
Condensat actively apache being critical day exploited http patches project server vulnerability wild zero
Tags Vulnerability
Stories
Notes
Move


Les reprises de l'article (1):
Source The_Hackers_News.webp The Hacker News
Identifiant 3471617
Date de publication 2021-10-05 07:53:29 (vue: 2021-10-05 15:05:59)
Titre Apache Warns of Zero-Day Exploit in the Wild - Patch You Web Servers Now!
Texte Apache has issued patches to address two security vulnerabilities, including a path traversal and file disclosure flaw in its HTTP server that it said is being actively exploited in the wild. "A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root," the open-source
Envoyé Oui
Condensat actively address apache attack attacker being change could day disclosure document expected exploit exploited file files flaw found has http including issued its made map normalization now open outside patch patches path root said security server servers source traversal two urls use vulnerabilities warns web wild zero
Tags
Stories
Notes
Move


L'article ressemble à 1 autre(s) article(s):
Src Date (GMT) Titre Description Tags Stories Notes
2021-10-07 12:36:06 (Déjà vu) Threat Advisory: Apache HTTP Server zero-day vulnerability opens door for attackers (lien direct) A recently discovered vulnerability in Apache HTTP Server (CVE-2021-41733) is being actively exploited in the wild. This vulnerability is a path traversal and file disclosure vulnerability that could allow an attacker to map URLs outside of the document root. It could also result in exposure of... [[ This is only the beginning! Please visit the blog for the complete entry ]] Vulnerability
My email: