Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 2.4.0 ~ 2.4.59 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-36387 | Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2 | |
| CVE-2024-38472 | Apache HTTP Server on WIndows UNC SSRF | |
| CVE-2024-38473 | Apache HTTP Server proxy encoding problem | |
| CVE-2024-38474 | Apache HTTP Server weakness with encoded question marks in backreferences | |
| CVE-2024-38475 | Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches file | |
| CVE-2024-38476 | Apache HTTP Server may use exploitable/malicious backend application output to run local h | |
| CVE-2024-38477 | Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious requ |
No comments yet