Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | unspecified ~ 2.4.53 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2022-31813 | mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism | |
| CVE-2022-30556 | Information Disclosure in mod_lua with websockets | |
| CVE-2022-30522 | mod_sed denial of service | |
| CVE-2022-28615 | Read beyond bounds in ap_strcmp_match() | |
| CVE-2022-28614 | read beyond bounds via ap_rwrite() | |
| CVE-2022-28330 | read beyond bounds in mod_isapi | |
| CVE-2022-26377 | mod_proxy_ajp: Possible request smuggling |
No comments yet