Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 2.4.0 ~ 2.4.59 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/Abdurahmon3236/CVE-2024-38473 | POC Details |
| 2 | Nuclei template to detect Apache servers vulnerable to CVE-2024-38473 | https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template | POC Details |
| 3 | Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38473.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-36387 | Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2 | |
| CVE-2024-38472 | Apache HTTP Server on WIndows UNC SSRF | |
| CVE-2024-38474 | Apache HTTP Server weakness with encoded question marks in backreferences | |
| CVE-2024-38475 | Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches file | |
| CVE-2024-38476 | Apache HTTP Server may use exploitable/malicious backend application output to run local h | |
| CVE-2024-38477 | Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious requ | |
| CVE-2024-39573 | Apache HTTP Server: mod_rewrite proxy handler substitution |
No comments yet