▲ | thefreeman 3 days ago | ||||||||||||||||
It also barely meets the definition of "a vulnerability report". He basically just nmap scanned the server and googled the apache version. The "critical" vulnerability he linked requires controlling a backend server being reverse proxied through apache... so completely irrelevant. I didn't read every CVE for the apache version but I am doubtful there is anything that actually allows taking over the server there. | |||||||||||||||||
▲ | roywashere 3 days ago | parent | next [-] | ||||||||||||||||
Also, Apache 2.4.57 is exactly the version of Apache you get when you'd run RHEL 9 / AlmaLinux / Rocky 9. In that case, the OS would provide backports of the CVE fixes for you and the banner still reads Apache 2.4.57! | |||||||||||||||||
| |||||||||||||||||
▲ | hughw 3 days ago | parent | prev [-] | ||||||||||||||||
I need to see ICE Block's SOC 2 Type 1 audit of their processes for patching vulnerabilities along with their latest SOC 2 Type 2 audit. | |||||||||||||||||
|