Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 2.4.0 to 2.4.29 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/whisp1830/CVE-2017-15715 | POC Details |
| 2 | Apache httpd 2.4.0 to 2.4.29 is susceptible to arbitrary file upload vulnerabilities via the expression specified in <FilesMatch>, which could match '$' to a newline character in a malicious filename rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are externally blocked, but only by matching the trailing portion of the filename. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-15715.yaml | POC Details |
| 3 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20HTTPd%20%E6%8D%A2%E8%A1%8C%E8%A7%A3%E6%9E%90%E6%BC%8F%E6%B4%9E%20CVE-2017-15715.md | POC Details |
| 4 | https://github.com/vulhub/vulhub/blob/master/httpd/CVE-2017-15715/README.md | POC Details |
No public POC found.
Login to generate AI POC

| CVE-2017-15710 | Apache httpd 安全漏洞 | |
| CVE-2018-1283 | Apache httpd 输入验证错误漏洞 | |
| CVE-2018-1301 | Apache HTTP Server 安全漏洞 | |
| CVE-2018-1302 | Apache HTTP Server 安全漏洞 | |
| CVE-2018-1303 | Apache HTTP Server 缓冲区错误漏洞 | |
| CVE-2018-1312 | Apache httpd mod_auth_digest模块安全漏洞 |
No comments yet