Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 2.4 ~ 2.4.54 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice | https://github.com/Saksham2002/CVE-2006-20001 | POC Details |
| 2 | A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice | https://github.com/r1az4r/CVE-2006-20001 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-37436 | Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response sp | |
| CVE-2022-36760 | Apache HTTP Server: mod_proxy_ajp Possible request smuggling |
No comments yet