CVE-2021-41773
Published on: 10/05/2021 12:00:00 AM UTC
Last Modified on: 10/28/2022 04:16:00 PM UTC
Certain versions of Http Server from Apache contain the following vulnerability:
A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.
- CVE-2021-41773 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Apache Software Foundation - Apache HTTP Server version = 2.4.49
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[SECURITY] Fedora 34 Update: httpd-2.4.51-1.fc34 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
Apache HTTPD: Multiple Vulnerabilities (GLSA 202208-20) — Gentoo security | security.gentoo.org text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
oss-security - CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
oss-security - RE: CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 | www.openwall.com text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
Apache HTTP Server Vulnerabilties: October 2021 | tools.cisco.com text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
October 2021 Apache HTTP Server Vulnerabilities in NetApp Products | NetApp Product Security | security.netapp.com text/html |
![]() |
Pony Mail! | lists.apache.org text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
[SECURITY] Fedora 35 Update: httpd-2.4.51-2.fc35 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
Oracle Critical Patch Update Advisory - January 2022 | www.oracle.com text/html |
![]() |
Pony Mail! | lists.apache.org text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
Apache HTTP Server 2.4 vulnerabilities - The Apache HTTP Server Project | httpd.apache.org text/html |
![]() |
Pony Mail! | lists.apache.org text/html |
![]() |
Apache HTTP Server 2.4.50 Remote Code Execution ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
Apache 2.4.49 / 2.4.50 Traversal / Remote Code Execution ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
oss-security - CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 | www.openwall.com text/html |
![]() |
Pony Mail! | lists.apache.org text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
Apache HTTP Server 2.4.49 Path Traversal / Remote Code Execution ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
Pony Mail! | lists.apache.org text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
oss-security - Re: CVE-2021-42013: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) | www.openwall.com text/html |
![]() |
Apache HTTP Server 2.4.49 Path Traversal ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
Related QID Numbers
- 150372 Apache HTTP Server Path Traversal (CVE-2021-41773)
- 150373 Apache HTTP Server Remote Code Execution (CVE-2021-41773)
- 281975 Fedora Security Update for httpd (FEDORA-2021-2a10bc68a4)
- 352857 Amazon Linux Security Advisory for httpd24: ALAS-2021-1543
- 352858 Amazon Linux Security Advisory for httpd: ALAS2-2021-1716
- 500023 Alpine Linux Security Update for apache2
- 690017 Free Berkeley Software Distribution (FreeBSD) Security Update for apache httpd (25b78bdd-25b8-11ec-a341-d4c9ef517024)
- 710595 Gentoo Linux Apache HTTPD Multiple Vulnerabilities (GLSA 202208-20)
- 87465 Apache Hypertext Transfer Protocol Server (HTTP Server) Path Traversal and Null Pointer Dereference Vulnerabilities
- 900395 Common Base Linux Mariner (CBL-Mariner) Security Update for httpd (5962)
Exploit/POC from Github
Path Traversal and RCE in Apache HTTP Server 2.4.49
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Apache | Http Server | 2.4.49 | All | All | All |
Operating System | Fedoraproject | Fedora | 34 | All | All | All |
Operating System | Fedoraproject | Fedora | 35 | All | All | All |
Application | Netapp | Cloud Backup | - | All | All | All |
Application | Oracle | Instantis Enterprisetrack | 17.1 | All | All | All |
Application | Oracle | Instantis Enterprisetrack | 17.2 | All | All | All |
Application | Oracle | Instantis Enterprisetrack | 17.3 | All | All | All |
- cpe:2.3:a:apache:http_server:2.4.49:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*:
- cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*:
- cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*:
Discovery Credit
This issue was reported by Ash Daulton along with the cPanel Security Team
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
If you use Apache HTTP Server 2.4.49 (only that version), you should update to 2.4.50 now due to CVE-2021-41773, a… twitter.com/i/web/status/1… | 2021-10-05 08:28:20 |
![]() |
cve.org/CVERecord?id=C… | 2021-10-05 08:44:20 |
![]() |
CVE-2021-41773 : A flaw was found in a change made to path normalization in #Apache HTTP Server 2.4.49. An attacker… twitter.com/i/web/status/1… | 2021-10-05 08:44:44 |
![]() |
If you use Apache HTTP Server 2.4.49 (only that version), you should update to 2.4.50 now due to CVE-2021-41773, a… twitter.com/i/web/status/1… | 2021-10-05 08:52:14 |
![]() |
important: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773) httpd.apache.org/security/vulne… | 2021-10-05 11:07:31 |
![]() |
CVE-2021-41773 は、無印の Apache 2.4.49 に影響する脆弱性。RedHat 等は、無印の Apache を各ベンダにカスタマイズしてリリースしているので、影響の有無は、すぐにはわからない。ベンダからの情報待ち。 うん。明日だな。 | 2021-10-05 11:30:19 |
![]() |
CVE-2021-41773 LOL what? Path traversal again. The most underrated vulnerability type ? lists.apache.org/thread.html/r6… | 2021-10-05 12:44:19 |
![]() |
? We have reproduced the fresh CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49. If files outside of t… twitter.com/i/web/status/1… | 2021-10-05 13:11:25 |
![]() |
CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49: Posted by Stefan Eis… twitter.com/i/web/status/1… | 2021-10-05 13:22:04 |
![]() |
? CVE-2021-41773 in Apache HTTP server 2.4 exploited in the wild httpd.apache.org/security/vulne… #0day #CVE https://t.co/bLRLfAdW0K | 2021-10-05 13:29:18 |
![]() |
Apache HTTP Server 2.4.49 path traversal and file disclosure #vulnerability CVE-2021-41773 httpd.apache.org/security/vulne… | 2021-10-05 13:33:32 |
![]() |
This is fun CVE-2021-41773 https://HOST/xx/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd @ptswarm do you have a T… twitter.com/i/web/status/1… | 2021-10-05 13:35:11 |
![]() |
Just got worked exploit PoC for path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) with my collab again… twitter.com/i/web/status/1… | 2021-10-05 13:53:03 |
![]() |
So CVE-2021-41773 can (by default) disclose the source to CGI scripts. That can be a big deal. Back in Jan 1995 I f… twitter.com/i/web/status/1… | 2021-10-05 13:53:20 |
![]() |
#segurtasuna #Apache #PathTraversal CVE-2021-41773 twitter.com/ptswarm/status… | 2021-10-05 13:55:43 |
![]() |
CVE-2021-41773 Apache 2.4.49 Path Traversal vulnerability twitter.com/ptswarm/status… | 2021-10-05 14:07:58 |
![]() |
?PoC is out for CVE-2021-41773 — a directory traversal bug in Apache httpd version 2.4.49 (it only impacts that ver… twitter.com/i/web/status/1… | 2021-10-05 14:12:59 |
![]() |
"Tracked as CVE-2021-41773, the vulnerability is the result of an incomplete path normalization logic implemented i… twitter.com/i/web/status/1… | 2021-10-05 14:16:26 |
![]() |
NEW: Apache fixes actively exploited web server zero-day -Tracked as CVE-2021-41773 -Issue resides in Apache's pat… twitter.com/i/web/status/1… | 2021-10-05 14:52:54 |
![]() |
CVE-2021-41773 POC 127.0.0.1/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd https://t.co/VeoQRkQ079 | 2021-10-05 14:54:16 |
![]() |
Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773) via /r/netsec… twitter.com/i/web/status/1… | 2021-10-05 14:59:36 |
![]() |
@cyph3r_asr @h4x0r_dz github.com/projectdiscove… | 2021-10-05 15:07:37 |
![]() |
@MCoetus @h4x0r_dz github.com/projectdiscove… | 2021-10-05 15:07:38 |
![]() |
...and the winner is @daffainfo github.com/projectdiscove… ? twitter.com/forgedhallpass… | 2021-10-05 15:09:42 |
![]() |
CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49. If files outside of the document root are not protec… twitter.com/i/web/status/1… | 2021-10-05 15:19:18 |
![]() |
CVE-2021-41773ですが、手元の検証環境で確認したところ、しっかりと刺さった。Apache 2.4.49のみ脆弱なようですが、該当バージョンをお使いの環境はアップデートしましょう。 https://t.co/mYJnXgMezK | 2021-10-05 15:22:31 |
![]() |
here we go! CVE-2021-41773 https://t.co/3RVDAFJU8P | 2021-10-05 15:26:19 |
![]() |
A new #attackerkb assesment on 'CVE-2021-41773' has been created by zeroSteiner. Attacker Value: 4 | Exploitability… twitter.com/i/web/status/1… | 2021-10-05 15:30:25 |
![]() |
CVE-2021-41773 POC ?? ✅ One Liner : cat targets.txt | while read host do ; do curl --silent --path-as-is --insec… twitter.com/i/web/status/1… | 2021-10-05 15:34:35 |
![]() |
Now that the cat is out of the bag.... You can PoC Test CVE-2021-41773 locally using Docker… twitter.com/i/web/status/1… | 2021-10-05 15:38:57 |
![]() |
CVE-2021-41773, the vulnerability affects only Apache web servers running version 2.4.49 therecord.media/apache-fixes-a… | 2021-10-05 15:41:05 |
![]() |
「important: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)」の影響は「Apa… twitter.com/i/web/status/1… | 2021-10-05 15:44:40 |
![]() |
CVE-2021-41773 looks fun...... https://t.co/JWcX6nHoHU | 2021-10-05 16:33:42 |
![]() |
CVE-2021-41773 結構一般的な設定で簡単に刺さりそう。脆弱なバージョンが2.4.49だけらしいから影響範囲はそれほど大きくはないのかな。 https://t.co/T0eWZwVBfO | 2021-10-05 16:35:11 |
![]() |
CVE-2021-41773 PoCも流れてるし世界中のキッズがShodan検索して攻撃しまくってそう | 2021-10-05 16:37:07 |
![]() |
Apache em risco Aviso do @ptswarm : Reproduzida a vulnerabilidade de Path Traversal CVE-2021-41773 no Apache 2.4.49… twitter.com/i/web/status/1… | 2021-10-05 16:37:07 |
![]() |
CVE-2021-41773、久々apacheやばたにさん感。 security.sios.com/vulnerability/… | 2021-10-05 16:39:46 |
![]() |
@GreyNoiseIO is seeing CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49 greynoise.io/viz/ip/36.68.5… GNQL Tag coming soon! | 2021-10-05 16:44:23 |
![]() |
CVE-2021-41773 - Path Traversal vulnerability in Apache 2.4.49 might cause some issues soon. twitter.com/schniggie/stat… | 2021-10-05 16:45:46 |
![]() |
@ptswarm We’re seeing at least 1 actor not utilizing the Nuclei module for CVE-2021-41773. twitter.com/_mattata/statu… | 2021-10-05 16:46:15 |
![]() |
Apache 2.4.49 - Path Traversal CVE-2021-41773 PoC: /cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd | 2021-10-05 16:47:24 |
![]() |
I wrote a quick NMAP script for CVE-2021-41773 (Path Traversal on Apache HTTP Server 2.4.49).… twitter.com/i/web/status/1… | 2021-10-05 16:51:26 |
![]() |
Scanning for CVE-2021-41773 (Apache 2.4.49 - Path Traversal) using template shared by @daffainfo Template -… twitter.com/i/web/status/1… | 2021-10-05 16:52:25 |
![]() |
コマンドを載せるのは自重したけど明日ぐらいには出回るだろうから、そのあと足すかな github.com/knqyf263/CVE-2… | 2021-10-05 16:56:29 |
![]() |
■■■■■ Zero-Day exploit code: github.com/Vulnmachines/c… | 2021-10-05 17:00:50 |
![]() |
■■■■■ Zero-Day exploit code: github.com/numanturle/CVE… | 2021-10-05 17:00:55 |
![]() |
For the CVE-2021-41773 affecting Apache HTTP Server 2.4.49 with certain configurations (2nd pic), the default Apach… twitter.com/i/web/status/1… | 2021-10-05 17:02:28 |
![]() |
In short, seems like the 6-hour #facebookoutage was due to a BGP misconfiguration, and #Apache CVE-2021-41773 had g… twitter.com/i/web/status/1… | 2021-10-05 17:16:52 |
![]() |
A recent vulnerability in Apache 2.4.49 (CVE-2021-41773) leads to path traversal and file disclosure. Are you awa… twitter.com/i/web/status/1… | 2021-10-05 17:45:38 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server cyberiqs.com/cve-2021-41773… #infosec #infosecurity… twitter.com/i/web/status/1… | 2021-10-05 17:57:37 |
![]() |
CVE-2021-41773 | 2021-10-05 17:57:45 |
![]() |
Quick and dirty #poc checker for CVE-2021-41773 github.com/ZephrFish/CVE-… | 2021-10-05 18:04:03 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/cyber_advising… #pow1rtrtwwcve | 2021-10-05 18:06:01 |
![]() |
این آسیب پذیری Path Traversal که در آپاچی 2.4.49 شناسایی شده (CVE-2021-41773) اصلا نمی خوره برای سال 2021 باشه!! مث… twitter.com/i/web/status/1… | 2021-10-05 18:08:06 |
![]() |
⚠️ Apache emitió parches de seguridad urgentes para abordar 2 nuevas vulnerabilidades (CVE-2021-41773). ¡A actualiz… twitter.com/i/web/status/1… | 2021-10-05 18:10:03 |
![]() |
?Nasty Path Traversal / file disclosure vulnerability in Apache 2.4.49. CVE-2021-41773? Valid if you have a conf… twitter.com/i/web/status/1… | 2021-10-05 18:10:45 |
![]() |
Had to join in on the CVE-2021-41773 hype. Tool in python to check whether a host is vulnerable, as well as patch m… twitter.com/i/web/status/1… | 2021-10-05 18:36:00 |
![]() |
Apache Server Exploit CVE-2021-41773: Flaw is in Apache HTTP Server 2.4.49. An attacker could use a path traversal… twitter.com/i/web/status/1… | 2021-10-05 18:41:31 |
![]() |
A path traversal vulnerability and in the wild exploit for Apache (CVE-2021-41773) dropped not long ago so I though… twitter.com/i/web/status/1… | 2021-10-05 18:41:51 |
![]() |
Apache HTTPD 2.4.49のみに影響するディレクトリトラバーサル脆弱性のCVE。10/4に2.4.50リリース済。 | 2021-10-05 18:42:43 |
![]() |
SIOSセキュリティブログを更新しました。 Apacheの脆弱性情報(Important: CVE-2021-41773, Moderate: CVE-2021-41524) #sios_tech #security… twitter.com/i/web/status/1… | 2021-10-05 18:43:00 |
![]() |
(2) CVE-2021-41773 POC One Liner ?: cat file.txt | while read host do ; do curl --silent --path-as-is --insecure… twitter.com/i/web/status/1… | 2021-10-05 18:43:03 |
![]() |
i wrote a very quick blog on creating the pot pwndefend.com/2021/10/05/cre… | 2021-10-05 18:48:00 |
![]() |
Path traversal in Apache CVE-2021-41773 GET /cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd Según shodan 65… twitter.com/i/web/status/1… | 2021-10-05 18:49:23 |
![]() |
⚠️ Vulnerabilidades críticas en Apache Server ? CVE-2021-41773 y CVE-2021-41524 afectan Apache HTTP Server en su v… twitter.com/i/web/status/1… | 2021-10-05 18:51:07 |
![]() |
github.com/Vulnmachines/c… github.com/numanturle/CVE… github.com/knqyf263/CVE-2… | 2021-10-05 19:20:20 |
![]() |
Creating a honeypot for CVE-2021-41773 cyberiqs.com/creating-a-hon… #infosec #infosecurity #cybersecurity #threatintel… twitter.com/i/web/status/1… | 2021-10-05 19:22:55 |
![]() |
Apache Warns of Zero-Day Exploit in the Wild — Patch Your Web Servers Now! CVE-2021-41773 #cybersecurity | 2021-10-05 19:30:40 |
![]() |
⚠️faut patcher rapidos CVE-2021-41773 dans Apache 2.4.49 (entres autres cpanel --> forums.cpanel.net/threads/apache… )… twitter.com/i/web/status/1… | 2021-10-05 19:33:19 |
![]() |
Het NCSC waarschuwt voor actief misbruik van een kwetsbaarheid in Apache web server (CVE-2021-41773). Inschaling v… twitter.com/i/web/status/1… | 2021-10-05 19:40:59 |
![]() |
CVE-2021-41773 Exploit POC: `/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd` github.com/Vulnmachines/c… | 2021-10-05 19:44:32 |
![]() |
My two PoC's for cve-2021-41773 are: localhost/cgi-bin/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc… twitter.com/i/web/status/1… | 2021-10-05 19:46:16 |
![]() |
So I tried to recreate the HTTPd Path Traversal bug (CVE-2021-41773) and commented out all the “<Directory >” setti… twitter.com/i/web/status/1… | 2021-10-05 19:47:21 |
![]() |
CVE-2021-41773. Di Indonesia ada sekitar 1445 host yang menggunakan Apache Server 2.4.49. https://t.co/keTlXSd3wC | 2021-10-05 19:47:51 |
![]() |
Wow, estamos realizando el escaneo masivo en México ??,para el CVE-2021-41773, hasta el momento el 24% de 1492 (re… twitter.com/i/web/status/1… | 2021-10-05 19:57:29 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 113 times. twitter.com/HackerGautam/s… #pow2rtrtwwcve | 2021-10-05 20:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 15 times. twitter.com/BushidoToken/s… #pow1rtrtwwcve | 2021-10-05 20:06:02 |
![]() |
The open-source project has rolled out a security fix for CVE-2021-41773, for which public cyberattack exploit code… twitter.com/i/web/status/1… | 2021-10-05 20:08:03 |
![]() |
"CVE-2021-41773 and it enables actors to map URLs to files outside the expected document root by launching a path t… twitter.com/i/web/status/1… | 2021-10-05 20:08:47 |
![]() |
At least 44 147 hosts are vulnerable to CVE-2021-41773 (Path Traversal Zero-Day in Apache HTTP Server) A quick anal… twitter.com/i/web/status/1… | 2021-10-05 20:11:08 |
![]() |
#Apache web server #zeroday vulnerability CVE-2021-41773 is being actively exploited in the wild - 100,000+ websit… twitter.com/i/web/status/1… | 2021-10-05 20:14:54 |
![]() |
日本でも影響が大きいと思われる、Apache HTTPサーバーのゼロディ脆弱性(CVE-2021-41773 )が発表されています。『Apache2.4.49』ユーザーは早期のパッチ当てを。 「Apacheは、積極的に悪用された… twitter.com/i/web/status/1… | 2021-10-05 20:15:00 |
![]() |
「積極的に悪用されたゼロデイ脆弱性はCVE-2021-41773として追跡され、パストラバーサル攻撃を開始することにより、アクターが予想されるドキュメントルート外のファイルにURLをマッピングできるようにします。」 | 2021-10-05 20:24:23 |
![]() |
Apache fixes actively exploited web server zero-day therecord.media/apache-fixes-a… "Tracked as CVE-2021-41773, the vulnera… twitter.com/i/web/status/1… | 2021-10-05 20:46:44 |
![]() |
CVE-2021-41773 Path Traversal in Apache HTTP 2.4.49 https://t.co/84hCZu50VN | 2021-10-05 20:56:44 |
![]() |
Made a simple lab to play around with Apache CVE-2021-41773 path traversal. Source code and manual:… twitter.com/i/web/status/1… | 2021-10-05 21:05:40 |
![]() |
The open-source project has rolled out a security fix for CVE-2021-41773, for which public cyberattack exploit code… twitter.com/i/web/status/1… | 2021-10-05 21:12:22 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited tenable.com/blog/cve-2021-… | 2021-10-05 21:14:10 |
![]() |
threatpost: The open-source project has rolled out a security fix for CVE-2021-41773, for which public cyberattack… twitter.com/i/web/status/1… | 2021-10-05 21:18:30 |
![]() |
The open-source project has rolled out a security fix for CVE-2021-41773, for which public cyberattack exploit code… twitter.com/i/web/status/1… | 2021-10-05 21:19:56 |
![]() |
2021-10-05 21:21:39 | |
![]() |
"The open-source project has rolled out a security fix for CVE-2021-41773, for which public cyberattack exploit cod… twitter.com/i/web/status/1… | 2021-10-05 21:21:56 |
![]() |
Apache HTTP Serverにパストラバーサル、ファイル開示の脆弱性 CVE-2021-41773。修正前に悪用が確認されている。 9月16日にリリースされた2.4.49のみかつ、ドキュメントルート外のファイルが「requ… twitter.com/i/web/status/1… | 2021-10-05 21:28:03 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited tenable.com/blog/cve-2021-… | 2021-10-05 21:31:03 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited - tenable.com/blog/cve-2021-… | 2021-10-05 21:34:21 |
![]() |
Will served the ??? for CVE-2021-41773 ? twitter.com/wdormann/statu… | 2021-10-05 21:34:56 |
![]() |
CVE-2021-41773 Todos los usuarios deben asegurarse de actualizar Apache a la versión 2.4.50. Debido a que la versi… twitter.com/i/web/status/1… | 2021-10-05 21:45:56 |
![]() |
انصح من لديه Apache HTTP Server 2.4.49 بالتحديث حالا CVE-2021-41773 #zero_day | 2021-10-05 21:46:01 |
![]() |
CVE-2021-41773, affects only Apache HTTP server version 2.4.49 Source : httpd.apache.org/security/vulne… Nuclei-Scan Templ… twitter.com/i/web/status/1… | 2021-10-05 21:54:55 |
![]() |
Apache HTTP Serverのパストラバーサル脆弱性(CVE-2021-41773)は既に悪用が確認済。これを利用されると「require all denied」で保護されていない場合、ファイルが外部より盗み見されます。… twitter.com/i/web/status/1… | 2021-10-05 21:55:25 |
![]() |
CVE-2021-41773 > Shodan Results. Ouch https://t.co/Q5x1c7Eeuh | 2021-10-05 21:56:51 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited tenable.com/blog/cve-2021-… | 2021-10-05 22:38:56 |
![]() |
Test your services against the latest Apache vulnerability CVE-2021-41773 with OWASP Nettacker. github.com/OWASP/Nettacker | 2021-10-05 22:41:41 |
![]() |
少し懐かしさを感じるCVE-2021-41773 Path Traversal github.com/apache/httpd/c… | 2021-10-05 22:43:48 |
![]() |
タイトルが不適切なため訂正しました。 Apache HTTP Serverの脆弱性情報(Important: CVE-2021-41773, Moderate: CVE-2021-41524) #sios_tech… twitter.com/i/web/status/1… | 2021-10-05 22:54:54 |
![]() |
Oh good, CVE-2021-41773 is in fact also RCE providing mod-cgi is enabled. An attacker can call any binary on the sy… twitter.com/i/web/status/1… | 2021-10-05 22:57:19 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited - Blog | Tenable® これかー tenable.com/blog/cve-2021-… | 2021-10-05 22:58:56 |
![]() |
Remote Command Execution in Apache 2.4.49 (earlier versions not affected). CVE-2021-41773 twitter.com/hackerfantasti… | 2021-10-05 23:06:04 |
![]() |
#apache #PoC Path traversal and file disclosure vulnerability in Apache #HTTP #Server 2.4.49 CVE-2021-41773 twitter.com/h4x0r_dz/statu… | 2021-10-05 23:10:48 |
![]() |
CVE-2021-41773 PoC curl -vk --path-as-is "127.0.0.1/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd" | 2021-10-05 23:12:21 |
![]() |
CVE-2021-41773、見た瞬間確実にHack The Boxで扱われると思った | 2021-10-05 23:16:09 |
![]() |
I see CVE-2021-41773 explotation trought CVE-2021-41773 explotation ? Path Traversal #0day in Apache HTTP Server 2… twitter.com/i/web/status/1… | 2021-10-05 23:17:35 |
![]() |
ServerもだけどXAMP使ってる人とかも危なそう。 / 1件のコメント b.hatena.ne.jp/entry?url=http… “CVE-2021-41773: Path Traversal Zero-Day in Apache HT… twitter.com/i/web/status/1… | 2021-10-05 23:19:26 |
![]() |
Exploiting CVE-2021-41773 to execute commands is incredibly easy once mod-cgi has been enabled... curl --data "A=… twitter.com/i/web/status/1… | 2021-10-05 23:22:20 |
![]() |
Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773) twitter.com/phithon_xg/sta… | 2021-10-05 23:23:19 |
![]() |
[Vulnerability Report] deepwatch Threat Operations is tracking CVE-2021-41773 and CVE-2021-41524 regarding vulnerab… twitter.com/i/web/status/1… | 2021-10-05 23:29:18 |
![]() |
Here's how to run full commands with arguments via CVE-2021-41773 via a path traversal vulnerability in the event m… twitter.com/i/web/status/1… | 2021-10-05 23:30:19 |
![]() |
Using #Apache HTTP Server and want to stay on top of #CVE-2021-41773? Rumble can help you find your vulnerable inst… twitter.com/i/web/status/1… | 2021-10-05 23:38:36 |
![]() |
@James_J_Hare @sickcodes versions previous to 2.4.49 are not vulnerable to CVE-2021-41773. only 2.4.49 | 2021-10-06 00:03:23 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 17 times. twitter.com/Bucio/status/1… #pow1rtrtwwcve | 2021-10-06 00:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 12 times. twitter.com/lofi42/status/… #pow1rtrtwwcve | 2021-10-06 00:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 12 times. twitter.com/ntsuji/status/… #pow1rtrtwwcve | 2021-10-06 00:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/cyph3r_asr/sta… #pow1rtrtwwcve | 2021-10-06 00:06:01 |
![]() |
One-liner to test CVE-2021-41773 (Apache 2.4.49 path traversal): | 2021-10-06 00:06:02 |
![]() |
Hice esta herramienta para detectar si una IP es vulnerable a CVE-2021-41773. For test one IP o from lista of IPs… twitter.com/i/web/status/1… | 2021-10-06 00:06:11 |
![]() |
Apache fixes actively exploited zero-day vulnerability, patch now bleepingcomputer.com/news/security/… CVE-2021-41773 パストラバーサル 影… twitter.com/i/web/status/1… | 2021-10-06 00:10:26 |
![]() |
Path traversal en Apache HTTP Server 2.4.49 (CVE-2021-41773) hackplayers.com/2021/10/path-t… | 2021-10-06 00:15:03 |
![]() |
@GossiTheDog wow reading that cve it is eerily familiar to cve-2021-41773 | 2021-10-06 00:19:39 |
![]() |
Apache 2.4.49でドキュメントルート外のファイルを読み取れる脆弱性 CVE-2021-41773 が判明したらしいんだけど、CentOS 8 Streamでも Apacheのバージョンは 2.4.37なんで 2.4.49… twitter.com/i/web/status/1… | 2021-10-06 00:20:02 |
![]() |
RedHat社は現時点で Under investigation(調査中) access.redhat.com/security/cve/C… | 2021-10-06 00:21:29 |
![]() |
Path traversal en Apache HTTP Server 2.4.49 (CVE-2021-41773) hackplayers.com/2021/10/path-t… | 2021-10-06 00:21:36 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited tenable.com/blog/cve-2021-… | 2021-10-06 00:24:28 |
![]() |
CVE-2021-41773 Exploit POC: GET /cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd HTTP/1.1 #cve_2021_41773… twitter.com/i/web/status/1… | 2021-10-06 00:30:55 |
![]() |
CVE-2021-41773 POC 127.0.0.1/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd | 2021-10-06 00:38:38 |
![]() |
apache の CVE-2021-41773 って 2.4.49 のみに影響するやつなのか。やっぱり人類には正規表現は早すぎたんだ的なやつだ。。。 | 2021-10-06 00:43:06 |
![]() |
はいcve-2021-41773の対応に追われます | 2021-10-06 00:44:32 |
![]() |
ゲー / “CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited” htn.to/3jD7MfuyBq | 2021-10-06 00:45:52 |
![]() |
@lorddemon creo un script para validar la vulnerabilidad en apache 2.4.49 (CVE-2021-41773), si tenemos infraestruc… twitter.com/i/web/status/1… | 2021-10-06 00:47:46 |
![]() |
話題のCVE-2021-41773 httpd.apache.org/security/vulne… ですが、現時点のRHELやNVDなどの脆弱性DBは調査中ステータスのため自動検知できない状況です。このような場合は「ソフトウェア名検索」機能で検索… twitter.com/i/web/status/1… | 2021-10-06 00:52:33 |
![]() |
@Bucio Revisalo bro :D y ponle la lista de IPs :D github.com/lorddemon/CVE-… | 2021-10-06 00:55:39 |
![]() |
先月リリースされたばかりのApache 2.4.49にやばそうな脆弱性(CVE-2021-41773)。 リモート実行可能でPoC公開済。 ドキュメントルート外のファイルについて、Requireディレクティブを拒否(Require… twitter.com/i/web/status/1… | 2021-10-06 01:00:27 |
![]() |
GreyNoise is observing vuln-checking and exploitation of Apache CVE-2021-41773 at internet-scale from several hosts… twitter.com/i/web/status/1… | 2021-10-06 01:44:45 |
![]() |
Mi hidden service parece vulnerable a ese cve-2021-41773 que es tan popular justo ahora y afecta a versiones de Apa… twitter.com/i/web/status/1… | 2021-10-06 01:44:50 |
![]() |
Apache HTTP Server 2.4.49で、パストラバーサルの脆弱性(CVE-2021-41773)が発見されました。 PoCが確立され、悪用も始まっています。 関連記事 security-next.com/130424… twitter.com/i/web/status/1… | 2021-10-06 01:49:14 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited tenable.com/blog/cve-2021-… | 2021-10-06 01:50:44 |
![]() |
CVE-2021-41773、すでに攻撃きとるやんけ | 2021-10-06 02:02:20 |
![]() |
『Apache HTTP Server 2.4.49について、パストラバーサルの脆弱性(CVE-2021-41773)が報告されています。 本脆弱性につき、Scutumでは既存の防御機能により本脆弱性公開前から攻撃を防御できている… twitter.com/i/web/status/1… | 2021-10-06 02:03:02 |
![]() |
?Apache HTTP Server 2.4.49 (CVE-2021-41773) vulnerable a ataques activos de Path Traversal y divulgación de archivo… twitter.com/i/web/status/1… | 2021-10-06 02:03:03 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 14 times. twitter.com/piyokango/stat… #pow1rtrtwwcve | 2021-10-06 02:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 13 times. twitter.com/1ZRR4H/status/… #pow1rtrtwwcve | 2021-10-06 02:06:01 |
![]() |
やったわけではないのですが、CVE-2021-41773の攻撃パターンは、現状、IDS/IPSだといわゆるディレクトリトラバーサル(パストラバーサル)として検知される可能性が非常に高く、「まぁいつものだよね」なーんてSOCで処理を… twitter.com/i/web/status/1… | 2021-10-06 02:06:10 |
![]() |
Una forma fácil y rápida de identificar la vulnerabilidad CVE-2021-41773 de apache es usar #subfinder + #httpx +… twitter.com/i/web/status/1… | 2021-10-06 02:07:58 |
![]() |
@hackerfantastic Was CVE-2021-41773 mis-scoped when it was published? "Additionally this flaw could leak the source… twitter.com/i/web/status/1… | 2021-10-06 02:17:25 |
![]() |
今ホットな話題のApache HTTP Serverのパストラバーサル脆弱性 (CVE-2021-41773)、実際に攻撃が観測されているという話。 twitter.com/kinyuka/status… | 2021-10-06 02:22:33 |
![]() |
- This morning Apache CVE-2021-41773 was disclosed - This afternoon internet-wide and vuln-checking and exploitatio… twitter.com/i/web/status/1… | 2021-10-06 02:22:54 |
![]() |
統合版 JPCERT/CC | 注意喚起: Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 (公開) ift.tt/3BgQM96 #itsec_jp | 2021-10-06 02:25:16 |
![]() |
Apache Software Foundation ha generado un parche para corregir vulnerabilidad CVE-2021-41773 de día cero sobre Apa… twitter.com/i/web/status/1… | 2021-10-06 02:28:03 |
![]() |
ApacheのCVE-2021-41773、RCEできるときはイントラ内に置いてあるサーバーでも攻略できそうね。 | 2021-10-06 02:28:49 |
![]() |
The no-upgrades people chuckling at CVE-2021-41773. | 2021-10-06 02:29:48 |
![]() |
注意喚起: Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 (公開) izumino.jp/Security/sec_t… jpcert.or.jp/at/2021/at2100… | 2021-10-06 02:30:20 |
![]() |
Security Alert: Alert Regarding Path Traversal Vulnerability (CVE-2021-41773) in Apache HTTP Server ift.tt/3A9c0Es #cybersecurity | 2021-10-06 02:31:18 |
![]() |
Apache HTTPサーバnパストラバーサル "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited - Blog | Tenable®" tenable.com/blog/cve-2021-… | 2021-10-06 02:32:46 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起を公開。脆弱性を悪用する攻撃がすでに確認されています。バージョン2.4.49を使用している場合、速やかに対策の実施をご検… twitter.com/i/web/status/1… | 2021-10-06 02:36:08 |
![]() |
朝からCVE-2021-41773がお祭り騒ぎに。。。 | 2021-10-06 02:36:24 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-10-06 02:40:25 |
![]() |
注意喚起: Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 (公開) - JPCERT/CC注意喚起 [securenews.appsight.net/entries/13442] jpcert.or.jp/at/2021/at2100… | 2021-10-06 02:41:12 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… “The Apache Software Foundationは、本… twitter.com/i/web/status/1… | 2021-10-06 02:41:28 |
![]() |
対象はApache 2.4.49のみか セーフ | 2021-10-06 02:45:01 |
![]() |
【注意喚起】 Apache HTTP Serverでゼロデイ公開。攻撃とPoCも確認されているとのこと。 jpcert.or.jp/at/2021/at2100… github.com/ZephrFish/CVE-… | 2021-10-06 02:45:29 |
![]() |
Apache 久しぶりにヤバそうなの来た / Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… @jpcert | 2021-10-06 02:46:49 |
![]() |
注意喚起: Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 (公開) dlvr.it/S90MdH https://t.co/GOOEaPXqbK | 2021-10-06 02:47:28 |
![]() |
Updated my blog on this to reflect the work @hackerfantastic did! nice work ! pwndefend.com/2021/10/05/cre… twitter.com/hackerfantasti… | 2021-10-06 03:23:16 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… @jpcert | 2021-10-06 03:23:40 |
![]() |
CVE-2021-41773 is dangerous. path traversal inside the httpd, rather than the application code, is kinda shocking. | 2021-10-06 03:24:36 |
![]() |
CVE-2021-41773やべぇ。こういうやつを防ぐ為のWAFって感じだ | 2021-10-06 03:26:30 |
![]() |
CVE-2021-41773 (Apache 2.4.49 限定) の件で mod-cgi を経由して RCE をする例。 2枚目は stdin に POST した内容が行って /bin/sh が食べる訳なので、それは動くよね・… twitter.com/i/web/status/1… | 2021-10-06 03:37:25 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773)ift.tt/3a8v8aX | 2021-10-06 03:38:52 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773) dlvr.it/S90Sq0 | 2021-10-06 03:45:01 |
![]() |
#CVE-2021-41773: Path Traversal #zeroday in Apache HTTP Server Exploited tenable.com/blog/cve-2021-… #infosec #cybersecurity | 2021-10-06 03:48:47 |
![]() |
The open-source project has rolled out a security fix for CVE-2021-41773, for which public cyberattack exploit code… twitter.com/i/web/status/1… | 2021-10-06 03:50:54 |
![]() |
PersonalStuff/http-vuln-cve-2021-41773.nse at master · RootUp/PersonalStuff #UI via twinybots.ch github.com/RootUp/Persona… | 2021-10-06 03:52:14 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773) ift.tt/3a8v8aX | 2021-10-06 03:57:42 |
![]() |
I see CVE-2021-41773 explotation trought CVE-2021-41773 explotation ? Path Traversal #0day in Apache HTTP Server 2… twitter.com/i/web/status/1… | 2021-10-06 04:00:26 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 131 times. twitter.com/hackerfantasti… #pow2rtrtwwcve | 2021-10-06 04:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 12 times. twitter.com/razielowfsky/s… #pow1rtrtwwcve | 2021-10-06 04:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 12 times. twitter.com/hackplayers/st… #pow1rtrtwwcve | 2021-10-06 04:06:02 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/knqyf263/statu… #pow1rtrtwwcve | 2021-10-06 04:06:02 |
![]() |
#infosec #vulnerable #Apache #server #HTTP CVE-2021-41773 PoC a8df476 6 hours ago github.com/iilegacyyii/Po… | 2021-10-06 04:11:22 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773):IPA 独立行政法人 情報処理推進機構 ipa.go.jp/security/ciadr… | 2021-10-06 04:14:04 |
![]() |
それらしきアタック多い。 Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-10-06 04:14:23 |
![]() |
Here's how to run full commands with arguments via CVE-2021-41773 via a path traversal vulnerability in the event m… twitter.com/i/web/status/1… | 2021-10-06 04:16:59 |
![]() |
Apache has released security updates to address a critical vulnerability (CVE-2021-41773) in their product. Read th… twitter.com/i/web/status/1… | 2021-10-06 04:21:38 |
![]() |
cve-2021-41773が刺さる環境、どの程度あるのかかなり興味あるな | 2021-10-06 04:21:41 |
![]() |
[Notice-CSA] Apache has released security updates to address a critical vulnerability (CVE-2021-41773) in their product. #SG_Alerts (12:21) | 2021-10-06 04:22:31 |
![]() |
自分のサイトのアップデート作業完了。 Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… @jpcert | 2021-10-06 05:03:59 |
![]() |
It’s 2021, CVE-2021-41773 shouldn’t be a thing. | 2021-10-06 05:14:53 |
![]() |
#うひーメモ 投稿時間:2021-10-06 14:20:40 CVE-2021-41773をDockerで確認する qiita.com/yousukezan/ite… #Docker | 2021-10-06 05:20:41 |
![]() |
Quand je vois le CVE-2021-41773 la CVE-2021-26084, et toutes les autres grosses CVE de l'année, je me dis que quelq… twitter.com/i/web/status/1… | 2021-10-06 05:23:48 |
![]() |
Path traversal en Apache HTTP Server 2.4.49 (CVE-2021-41773) hackplayers.com/2021/10/path-t… | 2021-10-06 05:27:36 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)においてクラウド型WAF 「Scutum」の既存の防御機能により、本脆弱性公開前から攻撃を防御 wmr.tokyo/startup/2021/8… | 2021-10-06 05:30:38 |
![]() |
?Un nuevo #zeroday de #Apache CVE-2021-41773 está siendo explotado! Las versiones vulnerables de Apache corresponde… twitter.com/i/web/status/1… | 2021-10-06 05:32:39 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773) ipa.go.jp/security/ciadr… | 2021-10-06 05:36:54 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)においてクラウド型WAF 「Scutum」の既存の防御... prtimes.jp/main/html/rd/p… https://t.co/HZyzBfHNPS | 2021-10-06 05:37:03 |
![]() |
Apache HTTP Server 2.4.49 CVE-2021-41773 nmap -Pn --script=cve-2021-41773.nse X.X.X.X -p X… twitter.com/i/web/status/1… | 2021-10-06 05:37:18 |
![]() |
In the Apache HTTP Server path traversal vulnerability (CVE-2021-41773), the existing defense function of the cloud… twitter.com/i/web/status/1… | 2021-10-06 05:37:27 |
![]() |
更新了:CVE-2021 描述:Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) URL. Zero-Day github.com/knqyf263/CVE-2… | 2021-10-06 05:39:42 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773) dlvr.it/S90hcb | 2021-10-06 05:40:32 |
![]() |
ICATalerts: Apache HTTP Server の脆弱性対策について(CVE-2021-41773) dlvr.it/S90hcb twitter.com/ICATalerts/sta… #itsec_jp | 2021-10-06 05:43:49 |
![]() |
v2.4.49 Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-10-06 05:47:30 |
![]() |
■■■■■ CVE-2021-41773.nse by Dhiraj (??/??) github.com/RootUp/Persona… | 2021-10-06 05:48:06 |
![]() |
株式会社セキュアスカイ・テクノロジー、Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)において クラウド型WAF 「Scutum」の既存の防御機能により、本脆弱性公開前から攻撃を防御 newsrelea.se/GbAOj3 | 2021-10-06 05:49:14 |
![]() |
cgid_moduleが有効だとRCEになることを確認したので刺さる環境だと怖い github.com/knqyf263/CVE-2… twitter.com/knqyf263/statu… | 2021-10-06 05:50:06 |
![]() |
Apache HTTP Server のパストラバーサルの脆弱性 (CVE-2021-41773) については、RHEL は影響ないみたいですね( ˘ω˘ ) access.redhat.com/security/cve/C… | 2021-10-06 05:52:29 |
![]() |
El número de la bestia de hoy es 2.4.49 CVE-2021-41773, una vulnerabilidad Zero-Day que podría estar afectando a 1… twitter.com/i/web/status/1… | 2021-10-06 06:39:59 |
![]() |
Apache #PathTraversal (CVE-2021-41773) was checked for all of our customers. Offensity users can also check their A… twitter.com/i/web/status/1… | 2021-10-06 06:45:11 |
![]() |
PersonalStuff/http-vuln-cve-2021-41773.nse at master · RootUp/PersonalStuff #UI via twinybots.ch github.com/RootUp/Persona… | 2021-10-06 06:45:18 |
![]() |
CRS has you covered against the new Apache path traversal attack CVE-2021-41773 by default. Well of course it has! coreruleset.org/20211006/crs-p… | 2021-10-06 06:52:22 |
![]() |
CVE-2021-41773 es simplemente maravilloso. https://t.co/SlKy3UcwlJ | 2021-10-06 06:55:47 |
![]() |
I see a lot of tweets on about CVE-2021-41773 and I asked my self if having a POC and a lame vuln justify a mass sc… twitter.com/i/web/status/1… | 2021-10-06 06:56:09 |
![]() |
Glücklicherweise läuft bei mir ein #Apache 2.2.34 und CVE-2021-41773 ist kein Problem für mich ... </ironie> | 2021-10-06 06:56:36 |
![]() |
rip CVE-2021-41773 | 2021-10-06 07:03:31 |
![]() |
Apache 2.4.49 - CVE-2021-41773 From path traversal to RCE ?!!!?! twitter.com/snyff/status/1… | 2021-10-06 07:05:36 |
![]() |
Attention si vous avez un Apache 2.4.49, zéro day sur attaque path transversal, corrigé en 2.4.50 fr.tenable.com/blog/cve-2021-… | 2021-10-06 07:07:14 |
![]() |
2.4.49で入れたパス正規化処理の問題ってことはCVE-2021-41773は影響あるの2.4.49だけなんかな。 | 2021-10-06 07:08:04 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)においてクラウド型WAF 「Scutum」の既存の防御機能により、本脆弱性公開前から攻撃を防御 ~脆弱性公開翌日の時点で、100サイト1… twitter.com/i/web/status/1… | 2021-10-06 07:09:54 |
![]() |
CVE-2021-41773 A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker co… twitter.com/i/web/status/1… | 2021-10-06 07:09:59 |
![]() |
Apache HTTP Server 2.4.49 Path Traversal (CVE-2021-41773) ift.tt/3BjsN96 | 2021-10-06 07:16:09 |
![]() |
【注意喚起】 Apache HTTP Serverでゼロデイ公開。攻撃とPoCも確認されているとのこと。 jpcert.or.jp/at/2021/at2100… github.com/ZephrFish/CVE-… | 2021-10-06 07:16:47 |
![]() |
So... now that's RCE and not "just" file read #Apache CVE-2021-41773 twitter.com/snyff/status/1… | 2021-10-06 07:18:55 |
![]() |
I've put together a small docker recipe that lets you try out CVE-2021-41773 in the comfort of your own lab. Also a… twitter.com/i/web/status/1… | 2021-10-06 07:20:12 |
![]() |
While CVE-2021-41773 is a fun vuln for sure, there's a LOT of prerequisites for code exec here. Apache HTTPD 2.4.49… twitter.com/i/web/status/1… | 2021-10-06 07:22:02 |
![]() |
Guessing CVE-2021-41773 (apache 2.4.49 path traversal) affects apache tomcat as well or am I mistaken? | 2021-10-06 07:24:10 |
![]() |
@Ax_Sharma Details and collated articles on this (continuously updated): attacksrfc.cstool.io/cve/CVE-2021-4… | 2021-10-06 07:26:31 |
![]() |
@Kerberosmansour @paradoxengine There is an OWASP #Nettacker module to detect Apache CVE-2021-41773, you can also s… twitter.com/i/web/status/1… | 2021-10-06 07:28:43 |
![]() |
注意喚起: Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 (公開) - jpcert.or.jp/at/2021/at2100… | 2021-10-06 08:02:46 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 12 times. twitter.com/GreyNoiseIO/st… #pow1rtrtwwcve | 2021-10-06 08:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/paradoxengine/… #pow1rtrtwwcve | 2021-10-06 08:06:00 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited - Blog | Tenable® tenable.com/blog/cve-2021-… | 2021-10-06 08:07:22 |
![]() |
Update : CVE-2021-41773 POC as RCE ??? ✅One Liner: cat file | while read host do ; do curl --silent --path-as-is -… twitter.com/i/web/status/1… | 2021-10-06 08:24:53 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)において クラウド型WAF ... izumino.jp/Security/sec_t… mapion.co.jp/news/release/d… | 2021-10-06 08:30:20 |
![]() |
CVE-2021-41773 Недавняя CVE-2021-41773 в Apache 2.4.49, это не только выход из директории с чтением файлов, как мн… twitter.com/i/web/status/1… | 2021-10-06 08:31:32 |
![]() |
Un script #nmap pour tester le CVE-2021-41773 (Path Traversal on Apache HTTP Server 2.4.49). #0day github.com/RootUp/Persona… | 2021-10-06 08:32:18 |
![]() |
CVE-2021-41773 ですが、ハニーポットのポート80と443にそれぞれ1件来ていました。いずれも調査行為相当の通信でした。 ポート80:POSTメソッドでechoコマンドの実行 ポート443:GETメソッドでパスワードファイルへのアクセス | 2021-10-06 08:32:28 |
![]() |
TL大体、CVE-2021-41773で遊んでる印象 | 2021-10-06 08:32:40 |
![]() |
#Apache #vulnerabilities CVE-2021-41773: Apache Vulnerability Exploited in the Wild sensorstechforum.com/cve-2021-41773… https://t.co/7ELiCh0u9K | 2021-10-06 08:35:52 |
![]() |
Urgent patch time for #Apache users! Path traversal and file disclosure (zero-day) vulnerabilities (CVE-2021-41773)… twitter.com/i/web/status/1… | 2021-10-06 08:36:14 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-10-06 08:44:04 |
![]() |
CVE-2021-41773 PoC: 127.0.0.1/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd Discovery: httpx -path "/cgi-bin/.%2e/%… twitter.com/i/web/status/1… | 2021-10-06 08:47:58 |
![]() |
พบช่องโหว่บน Apache HTTP Server มีการใช้โจมตีจริงแล้วแนะผู้ใช้เร่งอัปเดต techtalkthai.com/apache-http-se… | 2021-10-06 08:48:17 |
![]() |
?Apache、実際に悪用されているゼロデイ脆弱性へのパッチをリリース:CVE-2021-41773 ☎️電気通信大手Syniverse、2016年から続いたデータ流出を公表 ?Prometheusランサムウェアは「Spook… twitter.com/i/web/status/1… | 2021-10-06 08:51:54 |
![]() |
Suite à la publication d’un correctif Apache concernant la vulnérabilité CVE-2021-41773, le Cert-IST va publier une… twitter.com/i/web/status/1… | 2021-10-06 08:58:06 |
![]() |
Apache HTTP Server 2.4.49 の脆弱性(CVE-2021-41773)は、RedHatでは影響を受けないからCentOSも大丈夫かな。取り合えずPoC拾ってきてチェックしたけど。 access.redhat.com/security/cve/c… | 2021-10-06 09:00:48 |
![]() |
Added a signature into @ShadowMapTech and a significant part of the internet is vulnerable to this CVE-2021-41773. twitter.com/hackerfantasti… | 2021-10-06 09:24:31 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited tenable.com/blog/cve-2021-… | 2021-10-06 09:24:47 |
![]() |
予想通り、Redhat 影響受けず。 終了。 access.redhat.com/security/cve/C… | 2021-10-06 09:29:14 |
![]() |
‼ Brīdinājums Apache 2.4.49 lietotājiem! Atklāta jauna ievainojamība (CVE-2021-41773), kas sniedz uzbrucējiem iespē… twitter.com/i/web/status/1… | 2021-10-06 09:44:51 |
![]() |
CVE-2021-41773 やばいなあれ | 2021-10-06 09:47:31 |
![]() |
新增對CVE-2021-41773的利用。 github.com/HackerDev-Feli… https://t.co/BK6eooy4Rm | 2021-10-06 09:53:31 |
![]() |
#CVE-2021-41773 https://t.co/97HJXdXap9 | 2021-10-06 09:58:19 |
![]() |
First massive attempts to #exploit the #apache CVE-2021-41773 145.220.25.6 145.220.25.28 https://t.co/kJpYdJrFNc | 2021-10-06 10:02:31 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 13 times. twitter.com/__mn1__/status… #pow1rtrtwwcve | 2021-10-06 10:06:01 |
![]() |
Threat actors queuing up to exploit CVE-2021-41773 https://t.co/AtnxWk8K9Q | 2021-10-06 10:06:49 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773) ipa.go.jp/security/ciadr… | 2021-10-06 10:13:30 |
![]() |
github.com/iilegacyyii/Po… | 2021-10-06 10:36:32 |
![]() |
【2021/10/06 19:30追記】PoC(CVE-2021-41773)を追加しました。 Apache HTTP Serverの脆弱性情報(Important: CVE-2021-41773, Moderate: CVE-… twitter.com/i/web/status/1… | 2021-10-06 10:36:57 |
![]() |
Here's how to run full commands with arguments via CVE-2021-41773 via a path traversal vulnerability in the event m… twitter.com/i/web/status/1… | 2021-10-06 10:59:36 |
![]() |
Just got worked exploit PoC for path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) with my collab again… twitter.com/i/web/status/1… | 2021-10-06 11:07:41 |
![]() |
Over 100,000 Apache HTTP Servers Affected by Actively Exploited Zero-Day Flaw securityweek.com/over-100000-ap… CVE-2021-41773 | 2021-10-06 11:08:27 |
![]() |
#Cryptominers operators right now ? (CVE-2021-41773) https://t.co/NfM5lbbxqW | 2021-10-06 11:12:35 |
![]() |
SecurityWeek: Over 100,000 Apache HTTP Servers Affected by Actively Exploited Zero-Day Flaw securityweek.com/over-100000-ap… CVE-2021-41773 | 2021-10-06 11:14:26 |
![]() |
Bugbountytip: You can mute all mentions of CVE-2021-41773 and focus on you thing ??♂️ https://t.co/ecFAYtzfEp | 2021-10-06 11:18:10 |
![]() |
Attempts to #exploit CVE-2021-41773 in #Apache 2.4.49 detected, allowing for RCE in addition to information disclosure and path traversal. | 2021-10-06 11:27:32 |
![]() |
NMAP script for CVE-2021-41773 (Path Traversal on Apache HTTP Server 2.4.49). github.com/RootUp/Persona… #nmap #apache | 2021-10-06 11:27:41 |
![]() |
CVE-2021-41773のPoC動画出ていました。 お手軽攻撃ですが、どうやって脆弱性見つけたんだろうか。普段からソースコード頑張って読んでるのかな。 youtube.com/watch?v=2lQvAW… | 2021-10-06 11:27:50 |
![]() |
Users are urged to immediately patch CVE-2021-41773, an Apache HTTP Server zero-day vulnerability that has been exp… twitter.com/i/web/status/1… | 2021-10-06 11:28:00 |
![]() |
CVE-2021-41773 で報告された Apache の脆弱性ですが、早速うちの Web サーバーにもアクセスがありました。幸い脆弱性のある 2.4.49 がインストールされていなかったので問題ありませんでしたが、折角なので… twitter.com/i/web/status/1… | 2021-10-06 11:28:47 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)においてクラウド型WAF 「Scutum」の既存の防御機能により、本脆弱性公開前から攻撃を防御(via @Pocket)… twitter.com/i/web/status/1… | 2021-10-06 11:28:48 |
![]() |
勉強がてら CVE-2021-41773 を突いていた https://t.co/5PpMTvwd4Z | 2021-10-06 11:29:48 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-10-06 11:35:12 |
![]() |
CVE-2021-41773 POC ? One Liner : cat targets.txt | while read host do ; do curl --silent --path-as-is --insecure… twitter.com/i/web/status/1… | 2021-10-06 11:44:58 |
![]() |
#Apache HTTP Server 2.4.49 new CVE-2021-41773 allows an attacker to use a path traversal attack… twitter.com/i/web/status/1… | 2021-10-06 11:48:15 |
![]() |
Apache HTTPサーバーは使ってないけど、パストラバーサルまじですか…。パフォーマンスのためにちゃんとしたチェックを省いちゃったのかしら。 cve-2021-41773 | 2021-10-06 11:52:19 |
![]() |
tried CVE-2021-41773 https://t.co/N51DrF7Rfg | 2021-10-06 11:58:12 |
![]() |
CVE-2021-41773 is painfully simple to exploit ? https://t.co/C0gv18mFRf | 2021-10-06 11:58:26 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/kinyuka/status… #pow1rtrtwwcve | 2021-10-06 12:06:00 |
![]() |
Apache Webserver 2.4.49 (CVE-2021-41773) is a bad 0-day vulnerability. Look for content:"|2F 2E 25|2E|2F|"; or cont… twitter.com/i/web/status/1… | 2021-10-06 12:11:57 |
![]() |
CVE-2021-41773 はそれほど大騒ぎになってないなぁと思ったら対象が 2.4.49 だけなのね | 2021-10-06 12:13:57 |
![]() |
CVE-2021-41773 Apache RCE #infosec #CyberAttack #cybersecurity #bugbounty https://t.co/inOktHrKsr | 2021-10-06 12:39:36 |
![]() |
素敵ブログ。 Apache HTTP Serverの脆弱性情報(Important: CVE-2021-41773, Moderate: CVE-2021-41524) (PoCつき) -… twitter.com/i/web/status/1… | 2021-10-06 12:40:33 |
![]() |
Path traversal #zeroday affecting Apache HTTP Server is actively exploited in the wild. Detect CVE-2021-41773 explo… twitter.com/i/web/status/1… | 2021-10-06 12:48:38 |
![]() |
Apache 2.4.49 Directory Traversal Vulnerability (CVE-2021-41773) #apache #traversal #rce i5c.us/d27908 https://t.co/Ew70AzgdbM | 2021-10-06 12:50:12 |
![]() |
Searchable GN Tag for Apache CVE-2021-41773 is available now to see who’s exploiting this vulnerability. Tag includ… twitter.com/i/web/status/1… | 2021-10-06 12:50:36 |
![]() |
9月16日にリリースされたApache2.4.49のみ影響があるもよう Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… @jpcert | 2021-10-06 12:52:00 |
![]() |
?♂️If you want to exploit the Apache CVE-2021-41773 #vulnerability, you can use the same #exploit payload for the… twitter.com/i/web/status/1… | 2021-10-06 12:52:23 |
![]() |
Do you know there are five ways to exploit Apache CVE-2021-41773 vulnerability? We updated Picus Threat Library wit… twitter.com/i/web/status/1… | 2021-10-06 12:56:17 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited ow.ly/eFKY102ZQXW | 2021-10-06 13:04:03 |
![]() |
CVE-2021-41773 : Path Traversal in Apache HTTP Server 2.4.49 (only that version) POC:) hxxps://xxx/cgi-bin/.%2e/… twitter.com/i/web/status/1… | 2021-10-06 13:09:26 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-10-06 13:13:54 |
![]() |
#Apache HTTP Server 2.4.49 Path Traversal (CVE-2021-41773) tenable.com/plugins/nessus… #Nessus | 2021-10-06 13:15:08 |
![]() |
Alert Regarding Path Traversal Vulnerability (CVE-2021-41773) in Apache HTTP Server jpcert.or.jp/english/at/202…… twitter.com/i/web/status/1… | 2021-10-06 13:16:27 |
![]() |
Analizando la nueva vulnerabilidad de #Apache CVE-2021-41773 de forma masiva dentro del #Ecuador por el momento en… twitter.com/i/web/status/1… | 2021-10-06 13:16:38 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… > ドキュメントルート外のファイルを読み取るなどの可能性があります… twitter.com/i/web/status/1… | 2021-10-06 13:17:20 |
![]() |
CVE-2021-41773 POC FireDown pointing backhand index One liner POC. curl --silent --path-as-is --insecure "http:/… twitter.com/i/web/status/1… | 2021-10-06 13:29:52 |
![]() |
Let's see how to fix CVE-2021-41773 the Path Traversal and File Disclosure vulnerability in the post. https://t.co/AaGsttR1su | 2021-10-06 13:31:56 |
![]() |
"." の代わりに "%2E" と書くようなエンコーディングをすると、保護をバイパスする? CVE-2021-41773 の実際が、なんだかよくわからず >「Apache HTTP Server」のゼロデイ脆弱性が公開される、攻… twitter.com/i/web/status/1… | 2021-10-06 13:32:43 |
![]() |
Apache 2.4.49 Directory Traversal Vulnerability (CVE-2021-41773), (Wed, Oct 6th) twib.in/l/r6kRaRK6dkoE… twitter.com/i/web/status/1… | 2021-10-06 13:33:18 |
![]() |
@h4x0r_dz Script para nmap: CVE-2021-41773 raw.githubusercontent.com/hackingyseguri… | 2021-10-06 13:34:31 |
![]() |
Alert Regarding Path Traversal Vulnerability (CVE-2021-41773) in Apache HTTP Server jpcert.or.jp/english/at/202…… twitter.com/i/web/status/1… | 2021-10-06 13:35:26 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited - Blog fr.tenable.com/blog/cve-2021-… | 2021-10-06 13:36:09 |
![]() |
We've just scanned for CVE-2021-41773 and found at least 12,000 vulnerable hosts on the internet, likely more out t… twitter.com/i/web/status/1… | 2021-10-06 13:37:06 |
![]() |
Upozorňujeme na aktivní zneužívání path-traversal zranitelnosti Apache Web Serveru verze 2.4.49. (CVE-2021-41773).… twitter.com/i/web/status/1… | 2021-10-06 13:43:09 |
![]() |
Upozorňujeme na aktivní zneužívání path-traversal zranitelnosti Apache Web Serveru verze 2.4.49. (CVE-2021-41773).… twitter.com/i/web/status/1… | 2021-10-06 13:44:58 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in #Apache HTTP Server Exploited in the wild #0day directory traversal twitter.com/h4x0r_dz/statu… | 2021-10-06 14:09:49 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… @jpcert | 2021-10-06 14:16:02 |
![]() |
ドキュメントルート外に置かれた「require all denied」で保護されていないファイルにアクセスされる - CVE-2021-41773 twitter.com/ICATalerts/sta… | 2021-10-06 14:16:56 |
![]() |
Users are urged to immediately patch CVE-2021-41773, an Apache HTTP Server zero-day vulnerability that has been exp… twitter.com/i/web/status/1… | 2021-10-06 14:21:02 |
![]() |
話題の CVE-2021-41773 ですが、うちのハニポにも一件スキャンが来てました。 #Apache #脆弱性 #vulnerabilities https://t.co/aZtb05mxlD | 2021-10-06 14:29:57 |
![]() |
CVE-2021-41773は<Directory />Require all denied</Directory>のおまじないが役に立つやつかな | 2021-10-06 14:34:45 |
![]() |
In the fix for Apache HTTPD (CVE-2021-41773), if you call ap_normalize_path() with the flag AP_NORMALIZE_DROP_PARAM… twitter.com/i/web/status/1… | 2021-10-06 14:37:30 |
![]() |
Apache 2.4.49 Directory Traversal Vulnerability (CVE-2021-41773), (Wed, Oct 6th) isc.sans.edu/diary/rss/27908 | 2021-10-06 14:40:47 |
![]() |
Protecting against CVE-2021-41773 with @varnishcache: subr vcl_recv { if (req.url ~ "/%2[eE]%2[eE]") { retu… twitter.com/i/web/status/1… | 2021-10-06 14:46:23 |
![]() |
@GreyNoiseIO Results from our scans are now available to our users at : leakix.net/search?scope=l… | 2021-10-06 14:48:28 |
![]() |
Spent a decent amount of time trying to write a CVE-2021-41773 POC in Python this morning and could not get it to w… twitter.com/i/web/status/1… | 2021-10-06 14:52:32 |
![]() |
CVE-2021-41773 ile @sword_eye 'da etkilenen şirketler... https://t.co/eXRB8grcAw | 2021-10-06 14:58:27 |
![]() |
Who wants to be the first one to publicly offer a docker image for CVE-2021-41773 for educational purposes?… twitter.com/i/web/status/1… | 2021-10-06 15:14:51 |
![]() |
@secalert Here you are. github.com/vulhub/vulhub/… | 2021-10-06 15:17:13 |
![]() |
@secalert github.com/blasty/CVE-202… | 2021-10-06 15:17:38 |
![]() |
株式会社セキュアスカイ・テクノロジー、Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)においてクラウド型WAF 「Scutum」の既存の防御機能により、本脆弱性公開前から攻撃を防御 newsrelea.se/Gj8y49 | 2021-10-06 15:20:46 |
![]() |
5cases of CVE-2021-41773 0⃣ Apache 2.4.48 and earlier ?? 1⃣ Apache 2.4.50 ??♂️ 2⃣ Apache 2.4.49 + Require all deni… twitter.com/i/web/status/1… | 2021-10-06 16:00:14 |
![]() |
“According to a security advisory issued on Monday, the issue (CVE-2021-41773) could allow path traversal and subse… twitter.com/i/web/status/1… | 2021-10-06 16:01:12 |
![]() |
Today assignment gor my team is to read about CVE-2021-41773 and the path traversal vulnerability. Two years back… twitter.com/i/web/status/1… | 2021-10-06 16:02:15 |
![]() |
Okay skiddies, who are you gonna pop and leak before the end of #CybersecurityAwarenessMonth ?CVE-2021-41773… twitter.com/i/web/status/1… | 2021-10-06 16:08:24 |
![]() |
CVE-2021-41773 の脆弱性を悪用した攻撃が確認されているとの情報があるため、至急、アップデートを実施して下さい。 影響を受けるシステム ・Apache HTTP Server 2.4.49 ipa.go.jp/security/ciadr… | 2021-10-06 16:10:22 |
![]() |
Apache HTTP Server Project patches vulnerability (CVE-2021-41773) exploited in the wild buff.ly/3Bk2QX0… twitter.com/i/web/status/1… | 2021-10-06 16:19:01 |
![]() |
CVE-2021-41773 shodan.io/search?query=a… https://t.co/vIkVt2TtEX | 2021-10-06 16:24:21 |
![]() |
CVE-2021-41773 with @trick3st on the scale. https://t.co/x2GfQYOs1R | 2021-10-06 16:25:46 |
![]() |
Que semana más entretenida ¿no? Estamos a miércoles y hemos tenido la caída de FB, el CVE-2021-41773 en Apache y la… twitter.com/i/web/status/1… | 2021-10-06 16:29:53 |
![]() |
?حدود 338 تارگت ایرانی آسیبپذیر که بینشون تارگتهای مهم هم هست. ?CVE-2021-41773: Path traversal and file disclosure… twitter.com/i/web/status/1… | 2021-10-06 16:40:51 |
![]() |
Dans son dernier bulletin d'actualité ?, le CERT-FR revient sur la vulnérabilité CVE-2021-41773 affectant Apache HT… twitter.com/i/web/status/1… | 2021-10-06 16:42:13 |
![]() |
Apache HTTP Server CVE-2021-41773 Exploited in the Wild dlvr.it/S92fyr https://t.co/yut5XZWOCb | 2021-10-06 16:47:33 |
![]() |
Ovo je big deal tenable.com/blog/cve-2021-… | 2021-10-06 16:49:40 |
![]() |
Rapid 7 - Apache HTTP Server CVE-2021-41773 Exploited in the Wild ift.tt/3FjvZEp | 2021-10-06 16:54:23 |
![]() |
@hackerfantastic Is there any chance the cause of breach is CVE-2021-41773 | 2021-10-06 16:57:04 |
![]() |
Path Traversal crítico en Apache 2.4.49 - CVE-2021-41773 (Actualiza!) blog.segu-info.com.ar/2021/10/path-t… | 2021-10-06 17:31:32 |
![]() |
?? Grave vulnerabilidad (CVE-2021-41773) en el Servidor web Apache, permite ejecución remota de código, Urgente apl… twitter.com/i/web/status/1… | 2021-10-06 17:32:15 |
![]() |
Path Traversal crítico en Apache 2.4.49 - CVE-2021-41773 blog.segu-info.com.ar/2021/10/path-t… https://t.co/IvOsXVZn5Y | 2021-10-06 17:34:09 |
![]() |
On Monday, #Apache published an advisory on CVE-2021-41773, an unauthenticated remote file disclosure vulnerability… twitter.com/i/web/status/1… | 2021-10-06 17:40:04 |
![]() |
Apache HTTP Server CVE-2021-41773 Exploited in the Wild cyberiqs.com/apache-http-se… #infosec #infosecurity… twitter.com/i/web/status/1… | 2021-10-06 17:43:09 |
![]() |
Un chingo de banda trae el CVE-2021-41773, como pinche palo de piñata ...??? | 2021-10-06 17:50:27 |
![]() |
explotación bien loca, ¿ya viste @1978RRS? CVE-2021-41773 | 2021-10-06 17:54:39 |
![]() |
Numbers are climbing for CVE-2021-41773 https://t.co/CiDV1u511U | 2021-10-06 18:04:12 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 17 times. twitter.com/Andrew___Morri… #pow1rtrtwwcve | 2021-10-06 18:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/lorddemon/stat… #pow1rtrtwwcve | 2021-10-06 18:06:01 |
![]() |
#RT @owasp: RT @CoreRuleSet: CRS has you covered against the new Apache path traversal attack CVE-2021-41773 by def… twitter.com/i/web/status/1… | 2021-10-06 18:07:12 |
![]() |
Full technical analysis and PoC for CVE-2021-41773—an info leak-turned-RCE in certain Apache HTTP Server configurat… twitter.com/i/web/status/1… | 2021-10-06 18:09:45 |
![]() |
Apache 2.4.49 (CVE-2021-41773) ;RCE https://t.co/PdwBf6Qi5s | 2021-10-06 18:13:25 |
![]() |
Uma falha crítica e de fácil exploração (CVE-2021-41773) no servidor Apache 2.4.49 foi publicada hoje. Se explorada… twitter.com/i/web/status/1… | 2021-10-06 18:16:58 |
![]() |
‼(2/3) Our security teams are actively working to review CVE-2021-41773 in detail, and will be conducting the follo… twitter.com/i/web/status/1… | 2021-10-06 18:17:01 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited tenable.com/blog/cve-2021-… #cybersecurity… twitter.com/i/web/status/1… | 2021-10-06 18:20:33 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited ow.ly/A7Zh102ZSP6 | 2021-10-06 18:25:00 |
![]() |
Si vous utilisez Apache, pensez à vos mises à jour : la CVE-2021-41773 corrigée dans la version 2.4.50 semble facil… twitter.com/i/web/status/1… | 2021-10-06 18:58:51 |
![]() |
One of the biggest impacted application footprints I've seen so far with CVE-2021-41773 is CentOS webpanel (… twitter.com/i/web/status/1… | 2021-10-06 19:00:06 |
![]() |
Apache Releases Security Update for Apache HTTP Server #Anonymous cve.org/CVERecord?id=C… httpd.apache.org | 2021-10-06 19:03:57 |
![]() |
? Update your Apache HTTP Server ASAP. CVE-2021-41773 has been exploited in the wild. bit.ly/2WLg28i #Cybersecurity #InfoSec | 2021-10-06 19:04:37 |
![]() |
Spotting some fun CVE-2021-41773 activity https://t.co/72KJMKjUS6 | 2021-10-06 19:16:41 |
![]() |
4️⃣مصادر الثغرة : مصادر الثغرة :- httpd.apache.org/security/vulne… | 2021-10-06 19:17:28 |
![]() |
CVE-2021-41773: Apache HTTP Server v2.4.49 Path Traversal and cyberiqs.com/cve-2021-41773… #infosec #infosecurity… twitter.com/i/web/status/1… | 2021-10-06 19:30:37 |
![]() |
Path Traversal Attack Disclosed for Apache 2.4.49 lobste.rs/s/fkcjlh #security | 2021-10-06 20:00:19 |
![]() |
❓ Does your business use Apache web server? ??️ Patch it ASAP. Vulns: CVE-2021-41524 and CVE-2021-41773. A quick… twitter.com/i/web/status/1… | 2021-10-06 20:02:34 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 109 times. twitter.com/hackerfantasti… #pow2rtrtwwcve | 2021-10-06 20:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 11 times. twitter.com/CERT_FR/status… #pow1rtrtwwcve | 2021-10-06 20:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/bearstech/stat… #pow1rtrtwwcve | 2021-10-06 20:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/NUKIB_CZ/statu… #pow1rtrtwwcve | 2021-10-06 20:06:02 |
![]() |
#bugbountytips github.com/blasty/CVE-202… | 2021-10-06 20:27:45 |
![]() |
Infosec : Des preuve de concept (PoC) d'exploitation de la faille 0 day (référencée CVE-2021-41773) pour le serveur… twitter.com/i/web/status/1… | 2021-10-06 20:30:00 |
![]() |
「Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起」 - JPCERT/CC jpcert.or.jp/at/2021/at2100… | 2021-10-06 20:30:55 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited - Blog | Tenable® tenable.com/blog/cve-2021-… | 2021-10-06 20:32:18 |
![]() |
「バージョン「2.4.50」がリリースされてから数時間後には、複数のセキュリティ研究者が「CVE-2021-41773」を利用した攻撃の概念実証を行っており、該当するユーザーに速やかなアップデートを呼びかけています。」 gigazine.net/news/20211006-… | 2021-10-06 20:34:17 |
![]() |
CVE-2021-41773のやつ aeyesec.jp/news/apatche_c… | 2021-10-06 20:34:37 |
![]() |
Compartimos esta herramienta para detectar y evaluar si una IP es vulnerable a CVE-2021-41773, desarrollada por… twitter.com/i/web/status/1… | 2021-10-06 20:39:02 |
![]() |
Just pushed my PoC to get an RCE using the CVE-2021-41773 (Path Traversal in Apache 2.4.49) into @metasploit. You l… twitter.com/i/web/status/1… | 2021-10-06 20:53:35 |
![]() |
github.com/blasty/CVE-202… | 2021-10-06 20:54:23 |
![]() |
Patch your Apache servers, folks. #CVE-2021-41773 | 2021-10-06 21:11:48 |
![]() |
Actively exploited #Apache 0-day also allows remote code execution - CVE-2021-41773 is in fact also RCE “remote cod… twitter.com/i/web/status/1… | 2021-10-06 21:15:25 |
![]() |
Apache HTTP Server #RCE CVE-2021-41773 Exploited in the Wild rapid7.com/blog/post/2021… | 2021-10-06 21:19:24 |
![]() |
Apache HTTP Server 2.4.49 CVE-2021-41773 #### github.com/TishcaTpx/POC-… #### github.com/creadpag/CVE-2… https://t.co/M7hWNKqA6q | 2021-10-06 21:22:10 |
![]() |
■■■■■ Update : CVE-2021-41773 POC as RCE. cat file | while read host do ; do curl --silent --path-as-is --data "ec… twitter.com/i/web/status/1… | 2021-10-06 21:35:42 |
![]() |
Actively exploited Apache 0-day also allows remote code execution CVE-2021-41773 Apache fixes actively exploited ze… twitter.com/i/web/status/1… | 2021-10-06 21:42:31 |
![]() |
Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (#CVE-2021-41773) httpd.apache.org/security/vulne… | 2021-10-06 22:00:03 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 108 times. twitter.com/__mn1__/status… #pow2rtrtwwcve | 2021-10-06 22:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 11 times. twitter.com/sans_isc/statu… #pow1rtrtwwcve | 2021-10-06 22:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/CoreRuleSet/st… #pow1rtrtwwcve | 2021-10-06 22:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/SOC_Prime/stat… #pow1rtrtwwcve | 2021-10-06 22:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/dragosr/status… #pow1rtrtwwcve | 2021-10-06 22:06:02 |
![]() |
From /r/blueteamsec IOC IPs for CVE-2021-41773: 122.161.50.129 45.146.164.110 54.233.111.94 Toss those into your SIEM and get ready. | 2021-10-06 22:21:16 |
![]() |
0-day Schwachstelle (CVE-2021-41773) in Apache borncity.com/blog/2021/10/0… #Sicherheit Borns IT- & Windows-Blog | 2021-10-06 22:40:33 |
![]() |
0-day vulnerability (CVE-2021-41773) in Apache borncity.com/win/?p=21662 #Security Born's Tech and Windows World | 2021-10-06 22:44:49 |
![]() |
@synopsys is there a bulletin for confirming or discarding if your products are affected by apache cve-2021-41773? thanks. | 2021-10-06 22:46:06 |
![]() |
? We have updated our scans to include #RCE testing on CVE-2021-41773 : leakix.net/search?scope=l… https://t.co/CqL51JA2xH | 2021-10-06 23:07:28 |
![]() |
Apache httpd 2.4.49 を利用している方は至急 2.4.50 にアップデートしましょう! すでにパストラバーサルの脆弱性(CVE-2021-41773)を悪用した攻撃が確認されているとの情報があります。 twitter.com/aparblog_jp/st… | 2021-10-06 23:09:00 |
![]() |
19 new OPEN, 25 new PRO (19 + 9) Lazarus APT, Ursnif and Cobalt Strike CnC DNS sigs, Moar CVE-2021-41773, another M… twitter.com/i/web/status/1… | 2021-10-06 23:09:25 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… @jpcert | 2021-10-06 23:29:33 |
![]() |
Apache HTTP Server CVE-2021-41773 Exploited in the Wild - getinfosec.news/10174289/apach… #cybersecurity #cloud #network… twitter.com/i/web/status/1… | 2021-10-06 23:40:41 |
![]() |
En caso de que les sirva, les dejo un script hecho a la rápida para escanear múltiples host para #CVE_2021_41773 github.com/jheeree/Simple… | 2021-10-06 23:41:54 |
![]() |
CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49 could be used to run full commands with arguments⚠️ U… twitter.com/i/web/status/1… | 2021-10-06 23:49:05 |
![]() |
Two new challenges covering how to exploit the latest Apache Httpd RCE (CVE-2021-41773) via SSRF: File disclosure:… twitter.com/i/web/status/1… | 2021-10-06 23:50:03 |
![]() |
CVE-2021-41773は、再現も比較的簡単そうなので挑戦してみたい。 | 2021-10-07 00:02:26 |
![]() |
My HTTP honeypots are detecting attacks for CVE-2021-41773: path traversal and file disclosure vulnerability in Apa… twitter.com/i/web/status/1… | 2021-10-07 00:05:02 |
![]() |
>10/06 16:50 Apacheの脆弱性対応に伴う緊急メンテナンス mainte.value-domain.com/eventview.cgi?… : Apache HTTP Server の脆弱性対策について(CVE-2021-41773):IPA 独立… twitter.com/i/web/status/1… | 2021-10-07 00:07:01 |
![]() |
SaaS型Webアプリ診断ツール「AeyeScan」、 Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に対応 dreamnews.jp/press/00002454… | 2021-10-07 00:13:55 |
![]() |
@zeroc00I CVE-2021-41773 ? | 2021-10-07 00:15:40 |
![]() |
株式会社エーアイセキュリティラボ、SaaS型Webアプリ診断ツール「AeyeScan」、 Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に対応 newsrelea.se/w5gdlr | 2021-10-07 00:19:20 |
![]() |
@_joeygallegos @SimonByte This issue only affects 2.4.49 | 2021-10-07 00:25:19 |
![]() |
Apache HTTPd (2.4.49) – Local File Disclosure (LFI) CVE-2021-41773 github.com/oxctdev/CVE-20… #bugbounty… twitter.com/i/web/status/1… | 2021-10-07 00:39:42 |
![]() |
2021-10-07 00:56:38 | |
![]() |
Geek Food: Patch your Apache HTTP servers if you haven't already! There is a one line exploit of CVE-2021-41773 dir… twitter.com/i/web/status/1… | 2021-10-07 01:05:28 |
![]() |
grabber vuln cve-2021-41773 from shodan github.com/mohwahyudi/cve… #0day #apache0day #bugbounty | 2021-10-07 01:14:15 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に対応 - サンスポ izumino.jp/Security/sec_t… sanspo.com/geino/news/202… | 2021-10-07 01:20:15 |
![]() |
CVE-2021-41773 - Apache HTTP Server Path Traversal 0-Day - POC youtube.com/watch?v=fLDTc2… | 2021-10-07 01:26:40 |
![]() |
Serious?! This flaw is really actively exploited. Since yesterday, my server record many requests. CVE-2021-41773 https://t.co/y6TyYvDfYr | 2021-10-07 02:00:19 |
![]() |
?Apache、実際に悪用されているゼロデイ脆弱性へのパッチをリリース:CVE-2021-41773 ☎️電気通信大手Syniverse、2016年から続いたデータ流出を公表 ?Prometheusランサムウェアは「Spook… twitter.com/i/web/status/1… | 2021-10-07 02:04:54 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 125 times. twitter.com/ortegaalfredo/… #pow2rtrtwwcve | 2021-10-07 02:06:00 |
![]() |
Apache HTTP Server cgi-bin Path traversal and file disclosure (CVE-2021-41773) [PoC] curl --silent --path-as-is --… twitter.com/i/web/status/1… | 2021-10-07 02:26:36 |
![]() |
Over 100,000 Apache HTTP Servers Affected by Actively Exploited Zero-Day Flaw securityweek.com/over-100000-ap… CVE-2021-41773 | 2021-10-07 02:28:00 |
![]() |
SecurityWeek: Over 100,000 Apache HTTP Servers Affected by Actively Exploited Zero-Day Flaw securityweek.com/over-100000-ap… CVE-2021-41773 | 2021-10-07 02:29:53 |
![]() |
Apache HTTP Server 2.4.49 にドキュメントルートの外側のファイルへアクセスされる脆弱性 [CVE-2021-41773] | 脆弱性ブログ softek.co.jp/SID/blog/archi… | 2021-10-07 02:42:43 |
![]() |
@sigfpe He fixed it! "Yesterday, unbeknownst to me, a 0-day exploit (CVE-2021-41773) was revealed in the Apache we… twitter.com/i/web/status/1… | 2021-10-07 02:46:54 |
![]() |
HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… @jpcert | 2021-10-07 03:16:55 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773) ipa.go.jp/security/ciadr… | 2021-10-07 03:17:42 |
![]() |
Apacheの特定バージョン 2.4.49 にディレクトリトラバーサルの脆弱性があったのか。document root以外にrequired all grantedしてるとやられるらしい。普通に使われてそう。 | 2021-10-07 03:57:26 |
![]() |
Actively exploited Apache 0-day also allows remote code execution - CVE-2021-41773 is in fact also RCE providing mo… twitter.com/i/web/status/1… | 2021-10-07 04:00:08 |
![]() |
Jelasin vulnerability baru di apache 2.4.49 "path Traversal" cve-2021-41773 youtube.com/watch?v=O3JDr6… | 2021-10-07 04:30:00 |
![]() |
Apache HTTP Server 2.4.49に脆弱性が確認されたので,大至急アップデートしましょう.⚠️? ?Apache HTTP Server の脆弱性対策について(CVE-2021-41773) ipa.go.jp/security/ciadr… | 2021-10-07 04:32:24 |
![]() |
これをやらないと、ゼロデイ攻撃を受ける恐れがありますので。 JPCERT/CC Alert Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起(NetwingsJ...|… twitter.com/i/web/status/1… | 2021-10-07 05:17:04 |
![]() |
@MertSARICA 6218 server falan leakix.net/search?page=2&… | 2021-10-07 05:27:03 |
![]() |
#ThreatProtection #ThreatAlert Vulnerability in #Apache HTTP Server 2.4.49 (CVE-2021-41773) used in the wild, read… twitter.com/i/web/status/1… | 2021-10-07 05:53:53 |
![]() |
Oof, severe Apache vulnerability. That’s gonna leave a mark opencve.io/cve/CVE-2021-4… | 2021-10-07 06:03:19 |
![]() |
#Nuclei command for CVE-2021-41773 nuclei -t cves/2021/CVE-2021-41773.yaml -u http://127.0.0.1 -debug-resp | 2021-10-07 06:05:19 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 11 times. twitter.com/PentesterLab/s… #pow1rtrtwwcve | 2021-10-07 06:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/SecurityWeek/s… #pow1rtrtwwcve | 2021-10-07 06:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/Mekhalleh/stat… #pow1rtrtwwcve | 2021-10-07 06:06:01 |
![]() |
@ITConnect_fr Le CVE-2021-41773 a frappés !! il va faire mal celui-là ! | 2021-10-07 06:21:57 |
![]() |
PHP webshell via Apache CVE-2021-41773 https://t.co/bBTnMCGy1C | 2021-10-07 06:25:55 |
![]() |
Apache 2.4.50 suffers from more path traversal weaknesses than CVE-2021-41773. Good news: #OWASP #ModSecurity… twitter.com/i/web/status/1… | 2021-10-07 06:43:32 |
![]() |
? Retour sur la #CVE-2021-41773 Une vulnérabilité critique a été révélée sur #Apache 2.4.49 ce mardi 5 Octobre 202… twitter.com/i/web/status/1… | 2021-10-07 06:50:02 |
![]() |
Exploit Zero-Day in the Wild! CVE-2021-41773 has been hackers' exploit targets Patch Your Web Servers to 2.4.49… twitter.com/i/web/status/1… | 2021-10-07 07:03:57 |
![]() |
更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773):IPA 独立行政法人 情報処理推進機構 ipa.go.jp/security/ciadr… | 2021-10-07 07:18:14 |
![]() |
Apache 2.4.49 Directory Traversal Vulnerability (CVE-2021-41773), (Wed, Oct 6th) ift.tt/3AgNnWk | 2021-10-07 07:23:56 |
![]() |
?Alert - Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773) is being ex… twitter.com/i/web/status/1… | 2021-10-07 07:29:22 |
![]() |
Apache Http Server'larda CVE-2021-41773 koduyla zafiyet yayınlandı. En kısa zamanda güncellemeniz önerilmektedir. usom.gov.tr/bildirim/tr-21… | 2021-10-07 07:45:29 |
![]() |
? Update your Apache HTTP Server ASAP. CVE-2021-41773 has been exploited in the wild. bit.ly/2WLg28i #Cybersecurity #InfoSec | 2021-10-07 07:47:11 |
![]() |
Apache httpd CVE-2021-41773, 2.4.49 and 2.4.50 (#trolldi un peu en avance) https://t.co/oD75k3CIRc | 2021-10-07 07:55:01 |
![]() |
#Apache HTTP Server Project patches exploited #zeroday #vulnerability. The critical CVE-2021-41773 is being activel… twitter.com/i/web/status/1… | 2021-10-07 08:01:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/HackerGautam/s… #pow1rtrtwwcve | 2021-10-07 08:06:00 |
![]() |
CVE-2021-41773 ? https://t.co/AViwdU6Elf | 2021-10-07 09:08:14 |
![]() |
updated today. #RCE cert.at/de/warnungen/2… | 2021-10-07 09:15:24 |
![]() |
لعنتی Apache باز باگ hight level داد :| CVE-2021-41773 | 2021-10-07 09:20:55 |
![]() |
CVE-2021-41773 – Apache web server Path traversal securityboulevard.com/2021/10/cve-20… | 2021-10-07 09:23:43 |
![]() |
今日の業務はCVE-2021-41773について調べることだけで終わった | 2021-10-07 09:25:20 |
![]() |
bug di apache cve-2021-41773, uscita di phrack #70 e leak di twitch... tutto in un giorno (2021-10-05)! ?? | 2021-10-07 09:30:57 |
![]() |
Det vore intressant att veta hur många företag som blivit pwnd av Apache-buggen (CVE-2021-41773) och hur många aktö… twitter.com/i/web/status/1… | 2021-10-07 09:52:29 |
![]() |
CVE-2021-41773 – Apache web server Path traversal cyberiqs.com/cve-2021-41773… #infosec #infosecurity #cybersecurity… twitter.com/i/web/status/1… | 2021-10-07 10:04:54 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 12 times. twitter.com/adarshshettyy/… #pow1rtrtwwcve | 2021-10-07 10:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 11 times. twitter.com/wugeej/status/… #pow1rtrtwwcve | 2021-10-07 10:06:01 |
![]() |
NCSC ønsker å varsle om en sårbarhet i Apache versjon 2.4.49 nsm.no/fagomrader/dig… | 2021-10-07 10:25:02 |
![]() |
NCSC ønsker å komme med en oppdatering til varsel om sårbarhet i Apache HTTP Server 2.4.49. Les mer: nsm.no/fagomrader/dig… | 2021-10-07 10:26:23 |
![]() |
CVE-2021-41773 – Apache web server Path traversal | #linux | #linuxsecurity nationalcybersecuritynews.today/cve-2021-41773… | 2021-10-07 10:30:38 |
![]() |
CVE-2021-41773 – Apache web server Path traversal | #linux | #linuxsecurity nationalcybersecuritynews.today/cve-2021-41773… | 2021-10-07 10:30:39 |
![]() |
Apache Releases Security Update for Apache HTTP Server 2.4 [CVE-2021-41773] systemtek.co.uk/2021/10/apache… | 2021-10-07 11:30:06 |
![]() |
Apache Releases Security Update for Apache HTTP Server 2.4 [CVE-2021-41773] systemtek.co.uk/2021/10/apache… | 2021-10-07 11:30:06 |
![]() |
hey @Equifax, i thought i'd point out that Apache has released a fix for . time to update th… twitter.com/i/web/status/1… | 2021-10-07 11:54:22 |
![]() |
Why care about CVE-2021-41773 Path Traversal vuln in Apache 2.4.49: ?☠️currently exploited in the wild ?☠️allows… twitter.com/i/web/status/1… | 2021-10-07 12:29:23 |
![]() |
CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49… twitter.com/i/web/status/1… | 2021-10-07 12:45:02 |
![]() |
Apache HTTP Serverの脆弱性(CVE-2021-41773)のPoC youtu.be/iDyxyIbVU94 @YouTubeより | 2021-10-07 12:58:02 |
![]() |
RE: CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49: Posted by Tim Wa… twitter.com/i/web/status/1… | 2021-10-07 13:01:33 |
![]() |
更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773) ipa.go.jp/security/ciadr… | 2021-10-07 13:14:17 |
![]() |
#Apache Warns of Zero-Day Exploit in the Wild targeting #CVE-2021-41773 — Patch Your Web Servers Now if you run ver… twitter.com/i/web/status/1… | 2021-10-07 13:36:20 |
![]() |
Your organization uses Apache? You need to read this! CVE-2021-41773 warns of Path Traversal CVE-2021-41524 warns… twitter.com/i/web/status/1… | 2021-10-07 13:46:17 |
![]() |
New blog post! CVE-2021-41773 made rounds through news, the blogosphere and twitterverse. We now see public POCs (… twitter.com/i/web/status/1… | 2021-10-07 13:50:44 |
![]() |
❗️ #CERTWarnung️ ❗️ #Schwachstelle in Apache Webserver httpd ermöglicht auch #RCE (CVE-2021-41773). Die Schwachste… twitter.com/i/web/status/1… | 2021-10-07 13:52:10 |
![]() |
teamcymru: New blog post! CVE-2021-41773 made rounds through news, the blogosphere and twitterverse. We now see pu… twitter.com/i/web/status/1… | 2021-10-07 13:53:35 |
![]() |
Apache HTTPd (2.4.49) that is vulnerable to CVE-2021-41773 Playground github.com/blasty/CVE-202… | 2021-10-07 14:05:12 |
![]() |
CVE-2021-41773 - Apache web server Path traversal - Blueliv ⚓ blueliv.com/cyber-security… ䷉ #blueliv | 2021-10-07 14:05:30 |
![]() |
github.com/shiomiyan/CVE-… apacheのやつやってみた | 2021-10-07 15:03:41 |
![]() |
9.0 CVE-2021-40438 SSRF for #Apache if you're using mod_proxy. With this and CVE-2021-41773 floating around, it's a… twitter.com/i/web/status/1… | 2021-10-07 15:06:19 |
![]() |
Stating the obvious here, but once this gets merged, Apache CVE-2021-41773 vuln check and exploit traffic on intern… twitter.com/i/web/status/1… | 2021-10-07 15:24:25 |
![]() |
#CERT-EU issues alert for critical vulnerability #CVE-2021-41773 in #Apache HTTP Server version 2.4.49. | 2021-10-07 15:26:23 |
![]() |
#FortiGuardLabs Threat Signal Report: Newly disclosed Apache Vulnerability (CVE-2021-41773) Exploited in the Wild →… twitter.com/i/web/status/1… | 2021-10-07 15:41:35 |
![]() |
CVE-2021-41773 was such a weird bug to see in 2021. I can't believe that this actually worked. On Windows stdin/std… twitter.com/i/web/status/1… | 2021-10-07 15:48:29 |
![]() |
CVE-2021-42013 : It was found that the fix for CVE-2021-41773 in #Apache HTTP Server 2.4.50 was insufficient. An at… twitter.com/i/web/status/1… | 2021-10-07 15:53:37 |
![]() |
Have you heard of CVE-2021-41773 for your #Apache #httpd #WebServer ? The mitigation is ensuring a configuration is… twitter.com/i/web/status/1… | 2021-10-07 16:02:30 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 22 times. twitter.com/certbund/statu… #pow1rtrtwwcve | 2021-10-07 16:06:00 |
![]() |
[email protected] Threat Signal Report: Newly disclosed Apache Vulnerability (CVE-2021-41773) Exploited in the Wild… twitter.com/i/web/status/1… | 2021-10-07 16:27:11 |
![]() |
[email protected] Threat Signal Report: Newly disclosed Apache Vulnerability (CVE-2021-41773) Exploited in the Wild… twitter.com/i/web/status/1… | 2021-10-07 16:49:49 |
![]() |
We just took all the vulnerable Apaches (CVE-2021-41773) from Shodan... so... They are all now available in Hexway… twitter.com/i/web/status/1… | 2021-10-07 16:57:11 |
![]() |
See Apache's new update, which addresses both CVE-2021-41773 and CVE-2021-42013 (the latter is new):… twitter.com/i/web/status/1… | 2021-10-07 17:16:50 |
![]() |
CVE-2021-41773 is being exploited in the wild, and scanning is ubiquitous. ubuntu distributed 2.4.20, but debian a… twitter.com/i/web/status/1… | 2021-10-07 17:21:59 |
![]() |
Did you patch Apache to 2.4.50 for CVE-2021-41773? Patch again to 2.4.51. The fix in .50 was insufficient. httpd.apache.org/security/vulne… | 2021-10-07 17:24:02 |
![]() |
Another patch out for CVE-2021-41773 (bypass assigned CVE-2021-42013), be sure you've updated to Apache httpd Serve… twitter.com/i/web/status/1… | 2021-10-07 17:30:57 |
![]() |
"It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use… twitter.com/i/web/status/1… | 2021-10-07 17:39:01 |
![]() |
@enoclue It's fixed in debian security-tracker.debian.org/tracker/CVE-20… | 2021-10-07 17:39:08 |
![]() |
#Apache Software Foundation addresses CVE-2021-41773 and CVE-2021-42013 in patch in response to zero-day #vulnerability. | 2021-10-07 17:43:21 |
![]() |
[email protected] modified www/apache-httpd: update to Apache httpd 2.4.51, the previous fix for CVE-2021-41773 was insufficie… twitter.com/i/web/status/1… | 2021-10-07 17:55:12 |
![]() |
OPENBSD_6_9 [email protected] modified www/apache-httpd: update to Apache httpd 2.4.51, the previous fix for CVE-2021-41773 wa… twitter.com/i/web/status/1… | 2021-10-07 17:55:13 |
![]() |
OPENBSD_6_9 [email protected] modified www/apache-httpd: update to Apache httpd 2.4.51, the previous fix for CVE-2021-41773 wa… twitter.com/i/web/status/1… | 2021-10-07 17:55:13 |
![]() |
OPENBSD_7_0 [email protected] modified www/apache-httpd: update to Apache httpd 2.4.51, the previous fix for CVE-2021-41773 wa… twitter.com/i/web/status/1… | 2021-10-07 17:55:14 |
![]() |
OPENBSD_7_0 [email protected] modified www/apache-httpd: update to Apache httpd 2.4.51, the previous fix for CVE-2021-41773 wa… twitter.com/i/web/status/1… | 2021-10-07 17:55:14 |
![]() |
Apache HTTP Server の脆弱性対策について(CVE-2021-41773) ipa.go.jp/security/ciadr… | 2021-10-07 17:57:25 |
![]() |
Actively seeing exploit attempts for CVE-2021-41773 out of .ru POST /cgi-bin/.%2e/.%2e/.%2e/.%2e/bin/sh HTTP/1.1 | 2021-10-07 17:58:26 |
![]() |
It's new to me that Talos has a protection/signature/rule for the vulnerability CVE-2021-41773.… twitter.com/i/web/status/1… | 2021-10-07 18:02:01 |
![]() |
I know one more IPS that has a protection/signature/rule for the vulnerability CVE-2021-41773. ipssignatures.appspot.com/?cve=CVE-2021-… #Sppy4plvypmymc | 2021-10-07 18:02:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 23 times. twitter.com/hackerfantasti… #pow1rtrtwwcve | 2021-10-07 18:06:00 |
![]() |
Been getting a few questions, so he is our analysis of CVE-2021-41773: randori.com/blog/cve-2021-… | 2021-10-07 18:12:41 |
![]() |
CVE-2021-42013 - incomplete fix of CVE-2021-41773. https://t.co/rQxttqD1WL | 2021-10-07 18:21:37 |
![]() |
Busqueda de vulnerabilidades CVE-2021-41773 en shodan #cve #script #shodan https://t.co/vEu6x4bw4e | 2021-10-07 19:02:27 |
![]() |
Apache HTTP Server CVE-2021-41773 Exploited in the Wild rapid7.com/blog/post/2021… | 2021-10-07 19:35:55 |
![]() |
SOME PAYLOADS FOR TESTING: github.com/PentesterGuruj… NOTES -> pentesterguruji-notes.notion.site/CVE-2021-41733… GITHUB -> github.com/PentesterGuruj… | 2021-10-07 19:41:52 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 11 times. twitter.com/bad_packets/st… #pow1rtrtwwcve | 2021-10-07 20:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/_larry0/status… #pow1rtrtwwcve | 2021-10-07 20:06:01 |
![]() |
? Active scanning of Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelerate, like… twitter.com/i/web/status/1… | 2021-10-07 20:19:18 |
![]() |
Apatche again: new path traversal bug in Apache after incomplete patch for the actively exploited CVE-2021-41773 Ne… twitter.com/i/web/status/1… | 2021-10-07 20:52:14 |
![]() |
修正が不十分の為2.4.51がリリース Apache HTTP Serverの脆弱性情報(Critical: CVE-2021-42013, Important: CVE-2021-41773, Moderate: CVE-20… twitter.com/i/web/status/1… | 2021-10-07 21:06:09 |
![]() |
GreyNoise is observing vuln checking and exploitation of Apache CVE-2021-41773 at internet-scale from several hosts… twitter.com/i/web/status/1… | 2021-10-07 21:07:50 |
![]() |
Fix for CVE-2021-41773 is incomplete Path traversal vulnerability still exists and is actively exploited in the wi… twitter.com/i/web/status/1… | 2021-10-07 21:15:45 |
![]() |
New Blog from the @GreyNoiseIO research team on Apache CVE-2021-41773 TL;DR: We started seeing exploitation/probes… twitter.com/i/web/status/1… | 2021-10-07 21:25:42 |
![]() |
Apache living up to its patchy name this week ? 2.4.50 didn't fully fix CVE-2021-41773; go get 2.4.51… twitter.com/i/web/status/1… | 2021-10-07 21:31:08 |
![]() |
CVE-2021-42013 - Apache 2.4.49/2.4.50 - Path Traversal by nvn1729 "It was found that the fix for CVE-2021-41773 in… twitter.com/i/web/status/1… | 2021-10-07 22:29:43 |
![]() |
ワイのEKSクラスターにCVE-2021-41773の攻撃があって恐ろしくなった jpcert.or.jp/at/2021/at2100… | 2021-10-07 22:30:49 |
![]() |
CVE-2021-41773の追加修正 | 2021-10-07 22:52:40 |
![]() |
Apache 2.4.49/2.4.50 are vulnerable with this payload :) lol CVE-2021-41773 #bugbountytips https://t.co/HZZpfcq026 | 2021-10-07 22:54:02 |
![]() |
Apache HTTP Server vulnerability (CVE-2021-42013) due to inadequacy fix for (CVE-2021-41773) - allows remote unauth… twitter.com/i/web/status/1… | 2021-10-07 23:02:00 |
![]() |
RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): [email protected]:~# curl 'http://192.168… twitter.com/i/web/status/1… | 2021-10-07 23:13:08 |
![]() |
New vulnerability that allows Remote Code Execution (CVE-2021-41773, CVE-2021-42013) in Apache HTTP Server 2.4.49 a… twitter.com/i/web/status/1… | 2021-10-08 00:04:11 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 123 times. twitter.com/USCERT_gov/sta… #pow2rtrtwwcve | 2021-10-08 00:06:01 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 11 times. twitter.com/deltreed/statu… #pow1rtrtwwcve | 2021-10-08 00:06:01 |
![]() |
Apache HTTP Server CVE-2021-41773の脆弱性への修正が不完全だったため、2.4.51で再度修正が行われ、CVE-2021-42013として公開されています。 リモートコード実行に繋がる恐れもあります… twitter.com/i/web/status/1… | 2021-10-08 00:42:25 |
![]() |
خبرت خرابتر کرد جراحت جدايي چو خيال آب روشن که به تشنگان نمايي :)) Bug CVE-2021-41773 Apache HTTP Server Path Tra… twitter.com/i/web/status/1… | 2021-10-08 00:42:55 |
![]() |
باورم نمیشه این اشکال عجیب در سرویس آپاچی CVE-2021-41773 که کشف شد. بتوان به راحتی با آن فایلهای باینزی را در سروری… twitter.com/i/web/status/1… | 2021-10-08 00:50:22 |
![]() |
#Nuclei command for CVE-2021-41773 nuclei -t cves/2021/CVE-2021-41773.yaml -u http://127.0.0.1 -debug-resp | 2021-10-08 00:51:22 |
![]() |
Set up a honeypot last night that was vulnerable to CVE-2021-41773 #Apache code execution. Just got compromised. Th… twitter.com/i/web/status/1… | 2021-10-08 00:52:25 |
![]() |
Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.51 (incomplete fix of CVE-2021-41773) httpd.apache.org/security/vulne… | 2021-10-08 00:58:06 |
![]() |
Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.51 (incomplete fix of CVE-2021-41773) via /r/net… twitter.com/i/web/status/1… | 2021-10-08 00:59:57 |
![]() |
「CVE-2021-41773へのapache 2.4.50での対応が不十分だったから2.4.51だしたよ」- お前らなぁ感。まぁApache財団だからしょうがないんだけど。 downloads.apache.org/httpd/CHANGES_… | 2021-10-08 01:32:27 |
![]() |
“Vulnerabilities (CVE-2021-41773) & CVE-2021-42013) have been identified in Apache HTTP Server, one of the most com… twitter.com/i/web/status/1… | 2021-10-08 01:38:47 |
![]() |
New post: "Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.51 (incomplete fix of CVE-2021-41773)" ift.tt/3AgMOMo | 2021-10-08 01:48:15 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 37 times. twitter.com/roman_soft/sta… #pow1rtrtwwcve | 2021-10-08 02:06:00 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起を更新。脆弱性の修正が不十分としてバージョン2.4.51が公開されました。2.4.49および2.4.50を使用している場… twitter.com/i/web/status/1… | 2021-10-08 02:43:30 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 jpcert.or.jp/at/2021/at2100… | 2021-10-08 02:46:36 |
![]() |
「vulnerabilities (CVE-2021-41773, CVE-2021-42013) in Apache HTTP Server 2.4.49 and 2.4.50」→Apache Releases HTTP Ser… twitter.com/i/web/status/1… | 2021-10-08 03:30:32 |
![]() |
RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): POC... We got a Reverse Shell! youtu.be/WSVcuV2Wc58 | 2021-10-08 03:32:45 |
![]() |
[email protected] and I unpacking the Apache LPT is this week’s @bugcrowd Security Flash: Apache CVE-2021-41773 m.cje.io/3lkjdx9 | 2021-10-08 03:38:27 |
![]() |
更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773):IPA 独立行政法人 情報処理推進機構 ipa.go.jp/security/ciadr… | 2021-10-08 03:49:28 |
![]() |
CVE-2021-42013 & CVE-2021-41773 Apache HTTPd Path Traversal and Remote Code Execution https://t.co/kKhaIBSzpp | 2021-10-08 03:50:32 |
![]() |
The vuln CVE-2021-41773 has a tweet created 1 days ago and retweeted 11 times. twitter.com/andridev_/stat… #pow1rtrtwwcve | 2021-10-08 04:06:01 |
![]() |
Additional fixes to Apache HTTP Server for CVE-2021-41773, which is tracked as CVE-2021-42013 Bulletin:… twitter.com/i/web/status/1… | 2021-10-08 04:08:04 |
![]() |
For everyone who is having a hard time reproducing Apache Web Server CVE-2021-41773 locally, here is a one liner to… twitter.com/i/web/status/1… | 2021-10-08 04:08:23 |
![]() |
CVE-2021-41773 POC ?? ✅ One Liner : cat targets.txt | while read host do ; do curl --silent --path-as-is --insec… twitter.com/i/web/status/1… | 2021-10-08 04:09:49 |
![]() |
Apache HTTP Serverのパストラバーサルの脆弱性(CVE-2021-41773)に関する注意喚起 最終更新: 2021-10-08 jpcert.or.jp/at/2021/at2100… "本脆弱性を修正するバージョン2.4… twitter.com/i/web/status/1… | 2021-10-08 04:16:40 |
![]() |
A new urgent Apache patch update has been released for the actively exploited Path Traversal issue (CVE-2021-41773)… twitter.com/i/web/status/1… | 2021-10-08 04:54:11 |
![]() |
"A new urgent Apache patch update has been released for the actively exploited Path Traversal issue (CVE-2021-41773… twitter.com/i/web/status/1… | 2021-10-08 04:57:52 |
![]() |
続いてOSS関連ニュースのトピック。Apache HTTP Serverの脆弱性対策について(CVE-2021-41773)が話題に。 | 2021-10-08 05:21:01 |
![]() |
MASS CVE-2021-41773 ✅ #coding #dev #developer #programmer #programming #python #web #webdev pythonawesome.com/mass-cve-2021-… | 2021-10-08 05:23:32 |
![]() |
A new urgent Apache patch update has been released for the actively exploited Path Traversal issue (CVE-2021-41773)… twitter.com/i/web/status/1… | 2021-10-08 05:23:34 |
![]() |
CVE-2021-42013 & CVE-2021-41773 Apache HTTPd Path Traversal and Remote Code Execution #Apache #vulnerability https://t.co/v7eurGOex0 | 2021-10-08 05:41:01 |
![]() |
See the patch on the patch again:incomplete fix of CVE-2021-41773 --> CVE-2021-42013 httpd.apache.org/security/vulne… So Apache 2.4.50 also fell | 2021-10-08 05:50:50 |
![]() |
CVE-2021-41773 playground github.com/blasty/CVE-202… #Pentesting #CVE #CyberSecurity #Infosec https://t.co/Lo7rGMg9gN | 2021-10-08 05:52:17 |
![]() |
apache2のログを見てみたら%2Eがあちこちに。 これがCVE-2021-41773なのかなぁ。 | 2021-10-08 06:20:44 |
![]() |
Patch for CVE-2021-41773 introduces RCE. Patch now for CVE-2021-42013. A patchy server indeed. | 2021-10-08 06:21:58 |
![]() |
Make sure your Apache servers are up-to-date. #Cybersecurity vulnerability being exploited in the wild: | 2021-10-08 06:28:25 |
![]() |
yet another test for CVE-2021-41773, Apache HTTP Server 2.4.49 RCE: ``` host={YOUR HOST HERE}; curl --silent --pat… twitter.com/i/web/status/1… | 2021-10-08 06:39:04 |
![]() |
10/6にApache HTTP Server 2.4.49に脆弱性が発見されました。こちらには"CVE-2021-41773"という名前が付けられ、修正した2.4.50が公開されましが、2.4.50の修正は不十分で更なる脆弱性"… twitter.com/i/web/status/1… | 2021-10-08 06:39:45 |
![]() |
Vulnerabilidad en Apache (2.4.49) que permitiría a un atacante exfiltrar información. CVE-2021-42013 httpd.apache.org/security/vulne… | 2021-10-08 06:44:08 |
![]() |
“更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013):IPA 独立行政法人 情報処理推進機構” (1 user) htn.to/4967on9TX2 | 2021-10-08 06:45:01 |
![]() |
github.com/blasty/CVE-202… | 2021-10-08 06:46:09 |
![]() |
RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): curl 'host.com/cgi-bin/.%%32%…' --d… twitter.com/i/web/status/1… | 2021-10-08 06:46:55 |
![]() |
Exploiting #RCE exploit for #Apache 2.4.49 (#CVE-2021-41773) and 2.4.50 (CVE-2021-42013) in windows machine.… twitter.com/i/web/status/1… | 2021-10-08 06:51:17 |
![]() |
#Apache has released Apache #HTTP Server 2.4.51 to address vulnerabilities (CVE-2021-41773, CVE-2021-42013) in Apac… twitter.com/i/web/status/1… | 2021-10-08 06:52:17 |
![]() |
CVE-2021-41773 Исправлений в Apache HTTP Server 2.4.50 для CVE-2021-41773 оказалось недостаточно. При кастомизации… twitter.com/i/web/status/1… | 2021-10-08 07:10:40 |
![]() |
#Apache: nuova versione di HTTP Server sana la vulnerabilità CVE-2021-41773, non correttamente risolta tramite la v… twitter.com/i/web/status/1… | 2021-10-08 07:12:36 |
![]() |
Apacheのど派手な脆弱性2連発(CVE-2021-41773,CVE-2021-42013)でしたが、幸いScutumではどちらもゼロデイ防御可能なものでした。2つめはけっこう止められなかったWAFもあるんじゃないかな? twitter.com/kinyuka/status… | 2021-10-08 07:27:30 |
![]() |
Regarding Apache patch to 2.4.50 for CVE-2021-41773, it appears that the fix was insufficient. If you're concerned,… twitter.com/i/web/status/1… | 2021-10-08 07:49:34 |
![]() |
A new urgent Apache patch update has been released for the actively exploited Path Traversal issue (CVE-2021-41773)… twitter.com/i/web/status/1… | 2021-10-08 08:05:02 |
![]() |
The vuln CVE-2021-41773 has a tweet created 1 days ago and retweeted 10 times. twitter.com/calebjstewart/… #pow1rtrtwwcve | 2021-10-08 08:06:02 |
![]() |
CVE-2021-41773 apache path traversal I wrote a python tool to detect the bug with fast threading and 0 fal positiv… twitter.com/i/web/status/1… | 2021-10-08 08:09:05 |
![]() |
PoC(CVE-2021-42013)と動画を追加 Apache HTTP Serverの脆弱性情報(Critical: CVE-2021-42013, Important: CVE-2021-41773, Moderate:… twitter.com/i/web/status/1… | 2021-10-08 08:25:23 |
![]() |
Reproducing CVE-2021-41773 (Apache 2.4.49 and 2.4.50) with Docker gist.github.com/christophetd/c… https://t.co/wzPT21VqTf | 2021-10-08 08:25:54 |
![]() |
CVE-2021-41773: #Apache path traversal stats: around 100k affected servers online world wide. if you want the list… twitter.com/i/web/status/1… | 2021-10-08 08:34:45 |
![]() |
Great Tool ?? Good luck #bro #CVE-2021-41773 #Apache_path_traversal twitter.com/ZahirTariq3/st… | 2021-10-08 08:52:22 |
![]() |
CVE-2021-41773 #exploited #inthewild #apache2 [Fri Oct 08 09:13:09.327319 2021] [client 45.146.164.110:58458] AH0… twitter.com/i/web/status/1… | 2021-10-08 09:17:03 |
![]() |
Papildināts drošības ielāps ievainojamības CVE-2021-41773 novēršanai, aicinām atjaunināt Apache serverus uz 2.4.51… twitter.com/i/web/status/1… | 2021-10-08 09:46:24 |
![]() |
A new urgent Apache patch update has been released for the actively exploited Path Traversal issue (CVE-2021-41773)… twitter.com/i/web/status/1… | 2021-10-08 10:05:02 |
![]() |
Get ? #CVE CVE-2021-41773 Apache Path Traversal to RCE https://t.co/CLKVnyBJDD | 2021-10-08 10:07:40 |
![]() |
CFCS Sitcen er blevet bekendt med en sårbarhed i Apache HTTP Server. Det drejer sig om CVE-2021-41773, der kan føre… twitter.com/i/web/status/1… | 2021-10-08 10:07:40 |
![]() |
@CFCSsitcen Den nye RCE er CVE-2021-42013 (incomplete fix af CVE-2021-41773) seclists.org/oss-sec/2021/q… - værd at nævne. | 2021-10-08 10:12:43 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited ow.ly/ihZa10306Rs | 2021-10-08 10:24:24 |
![]() |
Sitzt ihr auf eigenen Apache-Servern? Kritische Schwachstelle CVE-2021-41773: Updated eure Kisten! Jetze! #Linux #Apache | 2021-10-08 10:26:38 |
![]() |
Helping Apache Servers stay safe from zero-day path traversal attacks (CVE-2021-41773). cfl.re/3mt6Iik | 2021-10-08 10:32:55 |
![]() |
Helping Apache Servers stay safe from zero-day path traversal attacks (CVE-2021-41773) gixtools.net/2021/10/helpin… | 2021-10-08 10:34:38 |
![]() |
[Cloudflare] Helping Apache Servers stay safe from zero-day path traversal attacks (CVE-2021-41773) ift.tt/3AntLA3 | 2021-10-08 10:36:12 |
![]() |
Apache HTTP Zero-day CVE-2021-41773 fix Bypassed With CVE-2021-42013 cyberkendra.com/2021/10/apache… #Apache #security #bugbounty #zeroday | 2021-10-08 10:40:25 |
![]() |
#Apache issues an emergency update to their previous fix for the actively exploited #CVE-2021-41773 #vulnerability… twitter.com/i/web/status/1… | 2021-10-08 10:41:15 |
![]() |
Apache 2.4.50 (CVE-2021-42013) RCE playground github.com/RedSection/poc… #bugbountytips | 2021-10-08 10:45:52 |
![]() |
CVE-2021-41773 esta siendo una pesadilla. | 2021-10-08 10:48:33 |
![]() |
Kommer ni ihåg CVE-2021-41773? Läser en artikel från Cloudflare: blog.cloudflare.com/helping-apache… Det gick ganska snabbt a… twitter.com/i/web/status/1… | 2021-10-08 10:52:16 |
![]() |
#QuickScan: Zero-day #vulnerability (CVE-2021-41773) in #Apache HTTP Server 2.4.49 is being actively exploited in w… twitter.com/i/web/status/1… | 2021-10-08 11:35:00 |
![]() |
確かにCVE-2021-41773をバイパスして攻撃できるわ。 さすが。 | 2021-10-08 11:35:12 |
![]() |
Helping Apache Servers stay safe from zero-day path traversal cyberiqs.com/helping-apache… #infosec #infosecurity… twitter.com/i/web/status/1… | 2021-10-08 11:38:39 |
![]() |
...la CVE-2021-41773. Se preconizează că procesul va accelera, ceea ce ar putea duce cât de curând la exploatare.… twitter.com/i/web/status/1… | 2021-10-08 11:40:03 |
![]() |
Helping Apache Servers stay safe from zero-day path traversal attacks (CVE-2021-41773) blog.cloudflare.com/helping-apache… | 2021-10-08 11:45:10 |
![]() |
Could someone explain to me why CVE-2021-41773 is an odd bug to see in 2021? Was there a year we fixed all complex logic errors in C? | 2021-10-08 11:45:27 |
![]() |
مهم ⚠️ ? Active scanning of #Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelera… twitter.com/i/web/status/1… | 2021-10-08 11:47:56 |
![]() |
A new urgent Apache patch update has been released for the actively exploited Path Traversal issue (CVE-2021-41773)… twitter.com/i/web/status/1… | 2021-10-08 11:53:12 |
![]() |
はてなブログに投稿しました。#ハニポで夜更かし CVE-2021-41773を初めて観測 2021/10/07 ハニーポット(仮) 観測記録 - コンニチハレバレトシタアオゾラ oubonarumamay.hatenablog.com/entry/2021/10/… | 2021-10-08 12:00:10 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 11 times. twitter.com/Andrew___Morri… #pow1rtrtwwcve | 2021-10-08 12:06:00 |
![]() |
CVE-2021-41773 free lab: github.com/htrgouvea/lab-… And a simple exploit for arbitrary file read/RCE here:… twitter.com/i/web/status/1… | 2021-10-08 12:32:14 |
![]() |
CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited - Blog | Tenable® fr.tenable.com/blog/cve-2021-… | 2021-10-08 12:43:46 |
![]() |
"It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use… twitter.com/i/web/status/1… | 2021-10-08 12:46:21 |
![]() |
⚠️ Ojo, nueva actualización urgente para Apache!! Se detectó que la corrección para el CVE-2021-41773 recientement… twitter.com/i/web/status/1… | 2021-10-08 13:05:02 |
![]() |
OJO: la actualización de seguridad Apache 2.4.50 NO soluciona la vulnerabilidad CVE-2021-41773 que esta siendo expl… twitter.com/i/web/status/1… | 2021-10-08 13:14:57 |
![]() |
Today I learnt to exploit CVE-2021-41773? through @PentesterLab 's exercise? | 2021-10-08 13:41:13 |
![]() |
Apache HTTP Server CVE-2021-41773 Exploited in the Wild disq.us/t/41qx8ox | 2021-10-08 13:43:15 |
![]() |
updated again. #sigh cert.at/de/warnungen/2… | 2021-10-08 13:51:10 |
![]() |
?اذا كنت تستخدم Apache HTTP Server قم بتحديثه واغلاق الثغرات CVE-2021-41773 & CVE-2021-42013. حيث يقوم المهاجمين ب… twitter.com/i/web/status/1… | 2021-10-08 13:57:16 |
![]() |
#earmas RT SeguInfo: OJO: la actualización de seguridad Apache 2.4.50 NO soluciona la vulnerabilidad CVE-2021-41773… twitter.com/i/web/status/1… | 2021-10-08 14:02:17 |
![]() |
Helping Apache Servers stay safe from zero-day path traversal attacks (CVE-2021-4177.. - getinfosec.news/10230114/helpi…… twitter.com/i/web/status/1… | 2021-10-08 14:03:48 |
![]() |
@enoclue Ubuntu claims they are not vulnerable to CVE-2021-41773 here: ubuntu.com/security/CVE-2… | 2021-10-08 14:37:44 |
![]() |
@enoclue And here: ubuntu.com/security/cve-2… | 2021-10-08 14:39:20 |
![]() |
Alert ⚠️? Hello All, Not sure if you've patched Apache to 2.4.50 for CVE-2021-41773. You should Patch again to 2… twitter.com/i/web/status/1… | 2021-10-08 14:58:32 |
![]() |
⚠️ If you just upgraded to #Apache 2.4.50 to avoid CVE-2021-41773, we have some bad news for you... you need to upg… twitter.com/i/web/status/1… | 2021-10-08 15:02:03 |
![]() |
Per the announcement: "...the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker co… twitter.com/i/web/status/1… | 2021-10-08 15:03:44 |
![]() |
? For more information about CVE-2021-41773, take a look at our blog. blog.malwarebytes.com/exploits-and-v… | 2021-10-08 15:04:28 |
![]() |
Path traversal and file disclosure #vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)… twitter.com/i/web/status/1… | 2021-10-08 16:04:09 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 115 times. twitter.com/TheHackersNews… #pow2rtrtwwcve | 2021-10-08 16:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 14 times. twitter.com/SeguInfo/statu… #pow1rtrtwwcve | 2021-10-08 16:06:01 |
![]() |
Mitigating CVE-2021-41773: Apache HTTP Server Path Traversal akamai.com/blog/news/how-… #cybersecurity #vulnerability https://t.co/c73fW9c2Hb | 2021-10-08 16:07:38 |
![]() |
RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013). Have fun ? and secure your work en… twitter.com/i/web/status/1… | 2021-10-08 16:36:22 |
![]() |
Just a friendly reminder : CVE-2021-41773 ( #apache path traversal ). Other Apache modules could be exploited and… twitter.com/i/web/status/1… | 2021-10-08 16:41:00 |
![]() |
The code is terrible but here is my to cve-2021-41773's xpl github.com/n3k00n3/CVE-20… | 2021-10-08 16:47:36 |
![]() |
@garywright2 This. Go patch people. clarussecurity.io/cve-2021-41773… | 2021-10-08 17:22:03 |
![]() |
A zero-day security bug (CVE-2021-41773) in the Apache HTTP Server is being actively exploited. Apache recommends… twitter.com/i/web/status/1… | 2021-10-08 17:45:03 |
![]() |
A new urgent Apache patch update has been released for the actively exploited Path Traversal issue (CVE-2021-41773)… twitter.com/i/web/status/1… | 2021-10-08 18:05:02 |
![]() |
Cryptomining botnet use Kinsing Malware and exploit CVE-2021-41773 akamai.com/blog/security/… twitter.com/SecShoggoth/st… | 2021-10-08 18:51:15 |
![]() |
CVE-2021-41773, CVE-2021-42013 jpcert.or.jp/at/2021/at2100… | 2021-10-08 19:20:15 |
![]() |
At least 100k hosts affected by Apache CVE-2021-41773. Not speaking about apache server without version disclosed.… twitter.com/i/web/status/1… | 2021-10-08 19:21:13 |
![]() |
あんまりセキュリティ界隈の空気感がわからないんだけど、CVE-2021-41773 (Apache httpd 2.4.49) の脆弱性は単にドキュメントルート外のファイルを読めるだけでなく、リモートコード実行の攻撃が成立しうるって情報は意図的に伏せられてたんですかね。 | 2021-10-08 19:32:08 |
![]() |
With the CVE-2021-41773 vulnerability in #Apache being exploited in the wild, we encourage customers to immediately… twitter.com/i/web/status/1… | 2021-10-08 20:00:00 |
![]() |
List of #IOC used on CVE-2021-41773 #Apache collected from the #honeypot of Tyler Hudak twitter.com/SecShoggoth/st… twitter.com/SecShoggoth/st… | 2021-10-08 20:04:18 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/MAlajab/status… #pow1rtrtwwcve | 2021-10-08 20:06:00 |
![]() |
@r00t_nasser github.com/0xRar/CVE-2021… ?♂️?♂️ | 2021-10-08 20:34:14 |
![]() |
Possibly used by threat actors after exploiting CVE-2021-41773 twitter.com/SecShoggoth/st… | 2021-10-08 20:58:32 |
![]() |
Been running a honeypot vulnerable to CVE-2021-41773 #Apache code execution for most of the day. Very disappointed… twitter.com/i/web/status/1… | 2021-10-08 21:14:41 |
![]() |
Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.51 (incomplete fix of #CVE-2021-41773) httpd.apache.org/security/vulne… | 2021-10-08 22:00:03 |
![]() |
PSA: Active Exploits against CVE-2021-41773 (Apache Web Server Exploit) - what we're seeing and what they are doing… twitter.com/i/web/status/1… | 2021-10-08 22:35:40 |
![]() |
Here is what we're seeing in relation to CVE-2021-41773... building technologies that make a difference.. boom! Ex… twitter.com/i/web/status/1… | 2021-10-08 22:36:53 |
![]() |
More probes coming in for CVE-2021-41773. https://t.co/R5MkHP8lIq | 2021-10-08 22:39:12 |
![]() |
Active #Exploits Against #Apache CVE-2021-41773 noc.org/2021/10/08/act… | 2021-10-08 23:14:08 |
![]() |
Apache httpd 2.4.49 および 2.4.50 を利用している方は至急 2.4.51 にアップデートしましょう!(2.4.50のCVE-2021-41773の対応は不完全でした) すでにパストラバーサルの脆弱性(… twitter.com/i/web/status/1… | 2021-10-09 00:20:56 |
![]() |
add. Apache 2.4.49 CVE-2021-41773 and Apache 2.4.50 CVE-2021-42013 – SCANNER/TRAVERSAL/RCE by mekhalleh · Pull Requ… twitter.com/i/web/status/1… | 2021-10-09 00:47:51 |
![]() |
Apache vừa phát hành các bản vá cho hai lỗ hổng đang bị tích cực khai thác. Trong đó lỗ hổng CVE-2021-41773 được đá… twitter.com/i/web/status/1… | 2021-10-09 03:28:57 |
![]() |
NowBrowsing: "更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013):IPA 独立行政法人 情報処理推進機構" ipa.go.jp/security/ciadr… | 2021-10-09 04:04:58 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/Malwarebytes/s… #pow1rtrtwwcve | 2021-10-09 04:06:00 |
![]() |
#أمن_المعلومات #برمجة Apache HTTP Server 2.4.49 and 50 - Path Traversal CVE-2021-41773 /.%2e CVE-2021-42013 /.%%3… twitter.com/i/web/status/1… | 2021-10-09 05:18:18 |
![]() |
CVE-2021-41773 #Apache 2.4.49 RCE curl 'http://127.0.0.1/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/… twitter.com/i/web/status/1… | 2021-10-09 05:28:33 |
![]() |
CVE-2021-41773: Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49… twitter.com/i/web/status/1… | 2021-10-09 06:50:01 |
![]() |
⚠️ If you just upgraded to #Apache 2.4.50 to avoid CVE-2021-41773, we have some bad news for you... you need to upg… twitter.com/i/web/status/1… | 2021-10-09 07:19:55 |
![]() |
Per the announcement: "...the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker co… twitter.com/i/web/status/1… | 2021-10-09 07:19:55 |
![]() |
? For more information about CVE-2021-41773, take a look at our blog. blog.malwarebytes.com/exploits-and-v… | 2021-10-09 07:19:56 |
![]() |
The vuln CVE-2021-41773 has a tweet created 2 days ago and retweeted 100 times. twitter.com/HackerGautam/s… #pow2rtrtwwcve | 2021-10-09 08:06:00 |
![]() |
Helping Apache Servers stay safe from zero-day path traversal attacks (CVE-2021-41773) blog.cloudflare.com/helping-apache…… twitter.com/i/web/status/1… | 2021-10-09 08:33:19 |
![]() |
This many #Apache 2.4.49/2.4.50: 350,000+ #CVE-2021-41773 #CVE-2021-42013 https://t.co/hBHz6vBmUv | 2021-10-09 09:11:28 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 10 times. twitter.com/infosec_90/sta… #pow1rtrtwwcve | 2021-10-09 10:06:00 |
![]() |
Metasploit-Framework modules (scanner and exploit) for the CVE-2021-41773 (Path Traversal in Apache 2.4.49)… twitter.com/i/web/status/1… | 2021-10-09 10:07:13 |
![]() |
Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ✅ #apache #coding #dev #developer… twitter.com/i/web/status/1… | 2021-10-09 10:28:11 |
![]() |
On Oct 4, 2021, #Apache announced fixes for a few #vulnerabilities, including a #zeroday flaw (CVE-2021-41773). It'… twitter.com/i/web/status/1… | 2021-10-09 11:30:19 |
![]() |
@eng_bunawaf يوجد تحديثين مختلفة يمكنك الاطلاع ⤵️? CVE-2021-41773 CVE-2021-42013 | 2021-10-09 11:56:58 |
![]() |
New based #vulnerability identifier, CVE-2021-42013, it builds on CVE-2021-41773, which was a vulnerability in… twitter.com/i/web/status/1… | 2021-10-09 12:04:29 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability: ift.tt/3uUyE2i by Security… twitter.com/i/web/status/1… | 2021-10-09 12:06:00 |
![]() |
@RandomDhiraj Expert published NMAP script for #Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… #securityaffairs #hacking | 2021-10-09 12:06:35 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… | 2021-10-09 12:07:32 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability: Security expert Dhiraj Mishra publis… twitter.com/i/web/status/1… | 2021-10-09 12:07:32 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability dlvr.it/S9CdMC | 2021-10-09 12:07:32 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability dlvr.it/S9CdRX #BreakingNews #Hacking | 2021-10-09 12:08:02 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability isecurityfeed.wordpress.com/2021/10/09/sec… | 2021-10-09 12:08:07 |
![]() |
The CVE-2021-41773 fix in #Apache #HTTP #Server 2.4.50 was deemed to be inadequate. To map #URLs to files outside o… twitter.com/i/web/status/1… | 2021-10-09 12:08:55 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… | 2021-10-09 12:15:04 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability - securityaffairs.co/wordpress/1231… | 2021-10-09 12:26:06 |
![]() |
ift.tt/3FyixfZ .. Security expert published NMAP script for Apache CVE-2021-41773 vulnerability #news… twitter.com/i/web/status/1… | 2021-10-09 12:28:17 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability itsecuritynews.info/security-exper… | 2021-10-09 12:35:29 |
![]() |
r/t "Security expert published NMAP script for Apache CVE-2021-41773 vulnerability" bit.ly/3mC5otF | 2021-10-09 12:47:48 |
![]() |
#Security expert published NMAP script for Apache CVE-2021-41773 vulnerability - redpacketsecurity.com/security-exper… #Hacking… twitter.com/i/web/status/1… | 2021-10-09 13:03:14 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… | 2021-10-09 13:09:32 |
![]() |
Did you patch your #Apache yet? A couple of my servers were porbed by what seems to be mass exploitation bots. #CVE-2021-41773 | 2021-10-09 13:51:50 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 cyberiqs.com/security-exper… #infosec #infosecurity… twitter.com/i/web/status/1… | 2021-10-09 13:57:54 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231…… twitter.com/i/web/status/1… | 2021-10-09 14:01:15 |
![]() |
Expert published NMAP script for Apache CVE-2021-41773 vulnerabilitySecurity Affairs securityaffairs.co/wordpress/1231… | 2021-10-09 14:23:17 |
![]() |
Apache HTTP Server 2.4.49/2.4.50 Incomplete Fix CVE-2021-41773 path traversal vuldb.com/?id.184042 | 2021-10-09 14:24:02 |
![]() |
With CVE-2021-41773, I'm surprised #microsoft and #billgates - bribed media doesn't call it a "LINUX" security issu… twitter.com/i/web/status/1… | 2021-10-09 15:06:21 |
![]() |
A little more on the #Apache CVE-2021-41773 honeypot. Still only seeing kinsing cryptominers installed. Have also… twitter.com/i/web/status/1… | 2021-10-09 15:17:29 |
![]() |
add. apache 2.4.49 CVE-2021-41773 - RCE #15754 github.com/rapid7/metaspl… #Pentesting #CyberSecurity #Infosec https://t.co/XDuLm398s6 | 2021-10-09 15:31:07 |
![]() |
ZDA pack 1.37 : - Apache 2.4.49 Remote Code Execution CVE-2021-41773 - Confluence Server 7.12.4 - RCE (Unauthentic… twitter.com/i/web/status/1… | 2021-10-09 16:24:37 |
![]() |
Security expert Dhiraj Mishra published an NMAP script for the CVE-2021-41773 Path Traversal vulnerability affectin… twitter.com/i/web/status/1… | 2021-10-09 16:25:04 |
![]() |
ApacheのCVE-2021-41773、遅ればせながら試してみたところ、あっさりPoCが刺さって驚愕。。 これはなかなか... | 2021-10-09 16:57:53 |
![]() |
noc.org/2021/10/08/act… | 2021-10-09 17:23:45 |
![]() |
The vuln CVE-2021-41773 has a tweet created 1 days ago and retweeted 10 times. twitter.com/YourAnonRiots/… #pow1rtrtwwcve | 2021-10-09 18:06:00 |
![]() |
はてなブログに投稿しました #はてなブログ Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-09 18:18:42 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-09 18:41:14 |
![]() |
#Security expert published NMAP script for #Apache CVE-2021-41773 #vulnerability securityaffairs.co/wordpress/1231… #SecurityAffairs | 2021-10-09 19:15:08 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerabi.. - getinfosec.news/10264462/secur…… twitter.com/i/web/status/1… | 2021-10-09 19:24:26 |
![]() |
Expert published NMAP script for #Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… #securityaffairs #hacking | 2021-10-09 19:54:02 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 13 times. twitter.com/ptracesecurity… #pow1rtrtwwcve | 2021-10-09 20:06:01 |
![]() |
■■■■■ Zero-Day: add. apache 2.4.49 CVE-2021-41773 - RCE Apache 2.4.49 CVE-2021-41773 and Apache 2.4.50 CVE-2021-42… twitter.com/i/web/status/1… | 2021-10-09 20:13:56 |
![]() |
? CVE-2021-41773 ⭐ 126 (+21) ? Dockerfile CVE-2021-41773 playground github.com/blasty/CVE-202… | 2021-10-09 21:03:03 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-09 22:55:50 |
![]() |
@boomneroli @ortegaalfredo It would be interesting to know if the CVE-2021-41773 fix corrected this also.. what you… twitter.com/i/web/status/1… | 2021-10-09 23:30:07 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 00:05:36 |
![]() |
The vuln CVE-2021-41773 has a tweet created 0 days ago and retweeted 15 times. twitter.com/piyokango/stat… #pow1rtrtwwcve | 2021-10-10 00:06:00 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… 数日前に話題になっていたやつだ。自分の検証環境で後で試してみる。 | 2021-10-10 00:55:47 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 01:27:28 |
![]() |
The vuln CVE-2021-41773 has a tweet created 3 days ago and retweeted 10 times. twitter.com/RapidSafeguard… #pow1rtrtwwcve | 2021-10-10 02:06:00 |
![]() |
New post: 【後で読みたい!】更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013) taksbar.link/?p=179868 | 2021-10-10 02:08:44 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 02:39:07 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 02:46:48 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog ift.tt/30cUova | 2021-10-10 02:51:54 |
![]() |
threatnix.io/blog/cve-2021-… | 2021-10-10 04:32:55 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 05:00:03 |
![]() |
“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” htn.to/2WxGdpp71P | 2021-10-10 05:22:57 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… パス(ディレクトリ)トラバーサ… twitter.com/i/web/status/1… | 2021-10-10 05:26:59 |
![]() |
#Security_expert #Penetration_Testing published #NMAP_script for #Apache CVE-2021-41773 #vulnerability vapt.me/NmapApache | 2021-10-10 05:30:07 |
![]() |
“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” htn.to/3ym3Gcb2no | 2021-10-10 05:33:05 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 05:34:48 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 05:54:17 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 06:36:14 |
![]() |
“Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” htn.to/3rKd8dWkqz | 2021-10-10 06:45:56 |
![]() |
Apache httpd の脆弱性に注意(CVE-2021-41524, CVE-2021-41773): Apache httpd に脆弱性が見つかり 2.4.50 がリリースされました(さらに修正版の 2... blog.cles.jp/item/12763?utm… | 2021-10-10 06:52:12 |
![]() |
? Active scanning of Apache HTTP Server CVE-2021-41773 & CVE-2021-42013 is ongoing and expected to accelerate, like… twitter.com/i/web/status/1… | 2021-10-10 07:48:52 |
![]() |
Security expert published NMAP script for #Apache CVE-2021-41773 vulnerability..., affecting Apache #Web #Server ve… twitter.com/i/web/status/1… | 2021-10-10 07:54:50 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 09:04:17 |
![]() |
Directory Transversal : github.com/justakazh/mass… Rce Scan : github.com/justakazh/mass… Rce manual :… twitter.com/i/web/status/1… | 2021-10-10 09:19:34 |
![]() |
まとめ助かる / “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” htn.to/3xvZKCt31a | 2021-10-10 09:52:36 |
![]() |
Expert published NMAP script for Apache CVE-2021-41773 vulnerabilitySecurity Affairs: securityaffairs.co/wordpress/1231… “the… twitter.com/i/web/status/1… | 2021-10-10 11:03:13 |
![]() |
Iseng iseng ngedork site CVE-2021-41773, eh dapet juga yang vuln https://t.co/NqOkT6x8X9 | 2021-10-10 11:23:47 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability secoperations.pt/security-exper… | 2021-10-10 11:49:16 |
![]() |
The vuln CVE-2021-41773 has a tweet created 2 days ago and retweeted 10 times. twitter.com/zhzyker/status… #pow1rtrtwwcve | 2021-10-10 12:06:00 |
![]() |
"Expert published NMAP script for Apache CVE-2021-41773 vulnerabilitySecurity Affairs" securityaffairs.co/wordpress/1231… | 2021-10-10 12:36:23 |
![]() |
【「Apache HTTP Server」のゼロデイ脆弱性が公開される、攻撃を防ぐには最新バージョンへのアップグレードが必要】 ・CVE-2021-41773 ・攻撃者はパストラバーサル攻撃を使用して、予想されるドキュメントルート… twitter.com/i/web/status/1… | 2021-10-10 13:02:37 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた piyolog.hatenadiary.jp/entry/2021/10/… b.hatena.ne.jp/entry/s/piyolo… | 2021-10-10 13:03:07 |
![]() |
【わずか3日、「Apache HTTPD」が再修正 - 前回修正は不十分、RCEのおそれも】 ・「CVE-2021-41773」が発現した「同2.4.49」および、修正版としてリリースされた「同2.4.50」のみ影響 ●security-next.com/130520" | 2021-10-10 13:04:51 |
![]() |
【更新:Apache HTTP Server の脆弱性対策について(CVE-2021-41773, CVE-2021-42013)】 ・バージョン 2.4.50 にて、修正が不十分であることが公表(CVE-2021-42013)さ… twitter.com/i/web/status/1… | 2021-10-10 13:05:10 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog ift.tt/30cUova | 2021-10-10 13:29:59 |
![]() |
@1stl0 CVE-2021-41773 POC | 2021-10-10 13:49:19 |
![]() |
Lack of proper fix for CVE-2021-41773 is showing that bug hunters, pentesters and researchers should provide a reco… twitter.com/i/web/status/1… | 2021-10-10 14:09:13 |
![]() |
はいきた! 私の仕事が増えるやーつ? #お仕事の話 Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 14:54:00 |
![]() |
1件のコメント b.hatena.ne.jp/entry?url=http… “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” (39 u… twitter.com/i/web/status/1… | 2021-10-10 16:18:39 |
![]() |
CVE-2021-41773 CHROME & FIREFOX #CVE-2021-41773 https://t.co/DtnT9K8L8r | 2021-10-10 17:17:30 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… | 2021-10-10 18:46:28 |
![]() |
Expert published NMAP script for #Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… #securityaffairs #hacking | 2021-10-10 20:01:33 |
![]() |
Apache 2.4.49 Directory Traversal Vulnerability (CVE-2021-41773), (Wed, Oct 6th) cybersafenv.org/apache-2-4-49-… | 2021-10-10 20:20:02 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… | 2021-10-10 20:36:11 |
![]() |
1件のコメント b.hatena.ne.jp/entry?url=http… “Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog” (42 u… twitter.com/i/web/status/1… | 2021-10-10 20:45:49 |
![]() |
Path Traversal Zero-Day en Apache HTTP Server | CVE-2021-41773|CVE-2021-42013 creadpag.com/2021/10/path-t… #cve… twitter.com/i/web/status/1… | 2021-10-10 21:54:03 |
![]() |
The vuln CVE-2021-41773 has a tweet created 5 days ago and retweeted 10 times. twitter.com/mxrchreborn/st… #pow1rtrtwwcve | 2021-10-10 22:06:00 |
![]() |
The vuln CVE-2021-41773 has a tweet created 2 days ago and retweeted 10 times. twitter.com/Mekhalleh/stat… #pow1rtrtwwcve | 2021-10-10 22:06:00 |
![]() |
Apache2.4.49に影響するパストラバーサル脆弱性(CVE-2021-41773)を検出するNMAPスクリプトが出た。 securityaffairs.co/wordpress/1231… | 2021-10-10 22:25:18 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 22:29:21 |
![]() |
やっとCVE-2021-41773を手元で確認できた...雑に試してForbidden祭りというダサい展開 | 2021-10-10 22:59:18 |
![]() |
他のスコアが高い脆弱性は、このサイトぐらい詳しく情報を提供してほしいなって常々思う。 特に攻撃方法とか。 Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめ… twitter.com/i/web/status/1… | 2021-10-10 23:06:45 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-10 23:49:19 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-11 00:15:11 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-11 00:24:10 |
![]() |
CVE-2021-41773、どう考えてもヤバいログがあったって担当者に連絡したけど、ガン無視されてます。個人としての好き嫌いと、警戒の要否は別にしてほしい。 | 2021-10-11 00:33:54 |
![]() |
Expert published NMAP script for Apache CVE-2021-41773 vulnerabilitySecurity Affairs - securityaffairs.co/wordpress/1231… | 2021-10-11 00:37:48 |
![]() |
夜行性インコさんのまとめ。先日から騒ぎになっているApacheの脆弱性について。PoCへのリンクもあり:Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめて… twitter.com/i/web/status/1… | 2021-10-11 00:58:54 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-11 01:45:24 |
![]() |
Also, the NVD still has no CVSS score for CVE-2021-41773 and the MITRE CVE entry was never updated, Apache created… twitter.com/i/web/status/1… | 2021-10-11 01:46:41 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-11 02:26:15 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-11 04:13:52 |
![]() |
ふむふむ。。。 RT: Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-11 04:29:42 |
![]() |
Apache 2.4.49 CVE-2021-41773 Path Traversal vulnerability. ⬇️⬇️⬇️ twitter.com/ptswarm/status… | 2021-10-11 04:55:08 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた – piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-11 05:23:05 |
![]() |
CVE-2021-41773の攻撃、家に置いているサーバーにも来ていた。 access.log:45.146.164.110 - - [11/Oct/2021:04:30:24 +0900] "POST /cgi-bin/.%2e… twitter.com/i/web/status/1… | 2021-10-11 05:51:15 |
![]() |
Apache httpd CVE-2021-41773, 2.4.49, 2.4.50 and 2.4.51 #DoublePatch #PrintNightmareStyle ? https://t.co/d2mqTLzbXF | 2021-10-11 05:51:56 |
![]() |
Apache HTTP Server の深刻な脆弱性CVE-2021-41773とCVE-2021-42013についてまとめてみた - piyolog piyolog.hatenadiary.jp/entry/2021/10/… | 2021-10-11 06:49:41 |
![]() |
[email protected] Threat Signal Report: Newly disclosed Apache Vulnerability (CVE-2021-41773) Exploited in the Wild… twitter.com/i/web/status/1… | 2021-10-11 07:05:11 |
![]() |
Script NSE para escáner nmap de la vulnerabilidad servidor web Apache 2.4.49 - CVE-2021-41773 github.com/RootUp/Persona… | 2021-10-11 08:45:04 |
![]() |
Apache 2.4.49/2.4.50 postmortem CVE-2021-41773 and CVE-2021-42013 github.com/icing/blog/blo… | 2021-10-11 08:50:11 |
![]() |
[email protected] Threat Signal Report: Newly disclosed Apache Vulnerability (CVE-2021-41773) Exploited in the Wild… twitter.com/i/web/status/1… | 2021-10-11 09:42:52 |
![]() |
It's new to me that Hillstone has a protection/signature/rule for the vulnerability CVE-2021-41773.… twitter.com/i/web/status/1… | 2021-10-11 10:02:01 |
![]() |
I know 2 other IPSs that have protections/signatures/rules for the vulnerability CVE-2021-41773. ipssignatures.appspot.com/?cve=CVE-2021-… #Sppy4plvypmymc | 2021-10-11 10:02:02 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability securityaffairs.co/wordpress/1231… | 2021-10-11 10:18:22 |
![]() |
CVE-2021-41773, CVE-2021-42013 "Apache/2.4.50" country:"JP" 361件 "Apache/2.4.51" country:"JP" 316件 対策したサーバ、増えたな。 ※… twitter.com/i/web/status/1… | 2021-10-11 10:29:16 |
![]() |
Apache HTTP Server 2.4.49 path traversal CVE-2021-41773 | 2021-10-05 14:31:55 |
![]() |
Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773) | 2021-10-05 14:31:04 |
![]() |
Path Traversal vulnerability in Apache 2.4.49 (CVE-2021-41773) | 2021-10-05 15:35:40 |
![]() |
Path Traversal vulnerability in Apache 2.4.49 (CVE-2021-41773) | 2021-10-05 15:35:09 |
![]() |
Path Traversal vulnerability in Apache 2.4.49 (CVE-2021-41773) | 2021-10-05 15:34:48 |
![]() |
CVE-2021-41524: Path Traversal vulnerability in Apache 2.4.49. | 2021-10-05 19:13:32 |
![]() |
CVE-2021-41773 | 2021-10-06 05:25:17 |
![]() |
Apache Zero Day Vulnerability CVE-2021-41773 | 2021-10-06 12:33:17 |
![]() |
CVE-2021-41773 How to update to latest apache2? | 2021-10-06 15:22:12 |
![]() |
Apache Releases HTTP Server version 2.4.51 to Address Vulnerabilities Under Exploitation | 2021-10-07 21:29:38 |
![]() |
Apache HTTP Server vulnerability does it affect KACE | 2021-10-07 21:03:16 |
![]() |
Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.51 (incomplete fix of CVE-2021-41773) | 2021-10-08 00:48:46 |
![]() |
Apache 2.4.49 Directory Traversal Vulnerability (CVE-2021-41773) | 2021-10-08 08:03:52 |
![]() |
Helping Apache Servers stay safe from zero-day path traversal attacks (CVE-2021-41773) | 2021-10-08 11:20:33 |
![]() |
Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.51 (incomplete fix of CVE-2021-41773) | 2021-10-08 16:19:44 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability | 2021-10-10 23:18:24 |
![]() |
Security expert published NMAP script for Apache CVE-2021-41773 vulnerability | 2021-10-11 23:45:54 |
![]() |
Experience the impact of CVE-2021-41773 in Apache 2.4.49 | 2021-10-18 10:10:07 |
![]() |
Apache HTTP Server CVE-2021-42013 and CVE-2021-41773 Exploited | 2021-10-22 07:29:33 |
![]() |
Apache Directory Traversal CVE-2021-41773 and CVE-2021-42013 Exploit | 2022-08-03 20:58:19 |
![]() |
Need Help Installing Outdated Apache Version | 2022-10-06 13:34:31 |
![]() |
CVE-2021-41773 (Apache) - Defensive | 2022-10-13 16:49:09 |
![]() |
Block Illegal Users | 2023-01-25 19:09:21 |