Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. rejetto
  4. HFS
  5. 2.2e

Known Vulnerabilities in HFS 2.2e

Show more ↓
2.3m
2.3l
2.3k
2.3j
2.3i
2.3h
2.3g
2.3f
2.3e
2.3d
2.3c
2.3b
2.3a
2.3
2.2a
2.2c
2.2b
2.2f
2.2e
2.2
0.55.3
0.55.2
0.55.0
0.54.0
0.53.2
0.53.1
0.53.0
0.52.10
0.52.9
0.52.8
0.52.7
0.52.6
0.52.5
0.52.4
0.52.3
0.52.2
0.52.1
0.52.0
0.51.3
0.51.2
0.51.1
0.51.0
0.50.6
0.50.5
0.50.4
0.50.3
0.50.2
0.50.1
0.50.0
0.49.4
0.49.3
0.49.2
0.49.1
0.49.0
0.48.3
0.48.2
0.48.1
0.48.0
0.47.4
0.47.3
0.47.2
0.47.1
0.47.0
0.46.1
0.46.0
0.45.0
0.44.0
0.43.0
0.42.3
0.42.2
0.42.0
0.41.0
0.40.1
0.40.0
0.39.0
0.38.3
0.38.2
0.38.1
0.38.0
0.37.0
0.36.0
0.35.0
0.34.1
0.34.0
0.33.0
0.32.0
0.31.0
0.30.2
0.30.1
0.30.0
0.29.1
0.29.0
0.28.0
0.27.2
0.27.1
0.27.0
0.26.9
0.26.8
0.26.7
0.26.6
0.26.5
0.26.4
0.26.3
0.26.2
0.26.1
0.26.0
0.25.0
0.24.3
0.24.2
0.24.1
0.24.0
0.23.1
0.23.0
0.22.2
0.22.1
0.22.0
0.21.1
0.21.0
0.20.1
0.20.0
0.19.0
0.18.0
0.17.3
0.17.2
0.17.1
0.17.0
0.16.0
0.15.0
0.14.5
0.14.4
0.14.3
0.14.2
0.14.1
0.14.0
0.13.0
0.12.0
0.11.0
0.10.0
0.9.1
0.9.0
0.8.2
0.8.1
0.8.0



Remote code execution in Rejetto HTTP File Server (HFS)05 Jul, 2024
Critical Not Patched Public exploit Exploited


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • AI chatbots fall for phishing scams
  • Chinese hackers exploited Ivanti flaws in attacks against French government
  • Threat actors exploit Vercel's AI tool v0 to build sophisticated phishing pages
  • Qantas alerts customers to potential data breach after third-party cyberattack
  • US sanctions Russian bulletproof hosting for supporting cybercrime
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.