Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 2.4.0 ~ 2.4.59 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/Abdurahmon3236/CVE-2024-38472 | POC Details |
| 2 | SSRF in Apache HTTP Server on Windows allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note- Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38472.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-36387 | Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2 | |
| CVE-2024-38473 | Apache HTTP Server proxy encoding problem | |
| CVE-2024-38474 | Apache HTTP Server weakness with encoded question marks in backreferences | |
| CVE-2024-38475 | Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches file | |
| CVE-2024-38476 | Apache HTTP Server may use exploitable/malicious backend application output to run local h | |
| CVE-2024-38477 | Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious requ | |
| CVE-2024-39573 | Apache HTTP Server: mod_rewrite proxy handler substitution |
No comments yet