![Finding and Exploiting Path traversal in apache 2.4.49 http server [CVE-2021–41773] | by Joy Ghosh | Medium Finding and Exploiting Path traversal in apache 2.4.49 http server [CVE-2021–41773] | by Joy Ghosh | Medium](https://miro.medium.com/max/1400/1*ySOJOi-DheQnIioJpin3Og.png)
Finding and Exploiting Path traversal in apache 2.4.49 http server [CVE-2021–41773] | by Joy Ghosh | Medium
![The new version of Apache 2.4.43 has already been released, it comes with improvements in modules and more | Ubunlog The new version of Apache 2.4.43 has already been released, it comes with improvements in modules and more | Ubunlog](https://ubunlog.com/wp-content/uploads/2020/04/Apache-2.4.43.png)
The new version of Apache 2.4.43 has already been released, it comes with improvements in modules and more | Ubunlog
![Apache 2.4.50 - Path Traversal |Create Vulnerable Lab Server (CVE-2021-42013)- Exploit |Pentest blog - YouTube Apache 2.4.50 - Path Traversal |Create Vulnerable Lab Server (CVE-2021-42013)- Exploit |Pentest blog - YouTube](https://i.ytimg.com/vi/cRPmeH-cNKg/maxresdefault.jpg)
Apache 2.4.50 - Path Traversal |Create Vulnerable Lab Server (CVE-2021-42013)- Exploit |Pentest blog - YouTube
![☠ Román Medina-Heigl Hernández on Twitter: "Working exploit for Apache 2.4.49 (CVE-2021-41773). The trick is that you need to prepend "/cgi-bin/" to the path traversal encoded string. https://t.co/C89Ygi5NsI" / Twitter ☠ Román Medina-Heigl Hernández on Twitter: "Working exploit for Apache 2.4.49 (CVE-2021-41773). The trick is that you need to prepend "/cgi-bin/" to the path traversal encoded string. https://t.co/C89Ygi5NsI" / Twitter](https://pbs.twimg.com/media/FA9RHddUUAY1BaQ.png:large)
☠ Román Medina-Heigl Hernández on Twitter: "Working exploit for Apache 2.4.49 (CVE-2021-41773). The trick is that you need to prepend "/cgi-bin/" to the path traversal encoded string. https://t.co/C89Ygi5NsI" / Twitter
![Another vulnerability in Apache httpd, allowing access outside the site root directory - itsfoss.net Another vulnerability in Apache httpd, allowing access outside the site root directory - itsfoss.net](https://i0.wp.com/www.itsfoss.net/wp-content/uploads/2021/10/Apache-web-server-1280x720-1.png?resize=770%2C515&ssl=1)