![☠ Román Medina-Heigl Hernández on Twitter: "Working exploit for Apache 2.4.49 (CVE-2021-41773). The trick is that you need to prepend "/cgi-bin/" to the path traversal encoded string. https://t.co/C89Ygi5NsI" / Twitter ☠ Román Medina-Heigl Hernández on Twitter: "Working exploit for Apache 2.4.49 (CVE-2021-41773). The trick is that you need to prepend "/cgi-bin/" to the path traversal encoded string. https://t.co/C89Ygi5NsI" / Twitter](https://pbs.twimg.com/media/FA9RHddUUAY1BaQ.png:large)
☠ Román Medina-Heigl Hernández on Twitter: "Working exploit for Apache 2.4.49 (CVE-2021-41773). The trick is that you need to prepend "/cgi-bin/" to the path traversal encoded string. https://t.co/C89Ygi5NsI" / Twitter
![Another vulnerability in Apache httpd, allowing access outside the site root directory - itsfoss.net Another vulnerability in Apache httpd, allowing access outside the site root directory - itsfoss.net](https://i0.wp.com/www.itsfoss.net/wp-content/uploads/2021/10/Apache-web-server-1280x720-1.png?resize=770%2C515&ssl=1)
Another vulnerability in Apache httpd, allowing access outside the site root directory - itsfoss.net
![Developer's Guide > Deployment > Native Apache 2.4 Module > Configuring Apache to run uniGUI Apache Module Developer's Guide > Deployment > Native Apache 2.4 Module > Configuring Apache to run uniGUI Apache Module](http://unigui.com/doc/online_help/clip0198.png)
Developer's Guide > Deployment > Native Apache 2.4 Module > Configuring Apache to run uniGUI Apache Module
![Apache 2.4.50 - Path Traversal |Create Vulnerable Lab Server (CVE-2021-42013)- Exploit |Pentest blog - YouTube Apache 2.4.50 - Path Traversal |Create Vulnerable Lab Server (CVE-2021-42013)- Exploit |Pentest blog - YouTube](https://i.ytimg.com/vi/cRPmeH-cNKg/maxresdefault.jpg)