Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 2.4.0 ~ 2.4.63 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-42516 | Apache HTTP Server: HTTP response splitting | |
| CVE-2024-47252 | Apache HTTP Server: mod_ssl error log variable escaping | |
| CVE-2024-43394 | Apache HTTP Server: SSRF on Windows due to UNC paths | |
| CVE-2025-23048 | Apache HTTP Server: mod_ssl access control bypass with session resumption | |
| CVE-2025-49630 | Apache HTTP Server: mod_proxy_http2 denial of service | |
| CVE-2025-49812 | Apache HTTP Server: mod_ssl TLS upgrade attack | |
| CVE-2025-53020 | Apache HTTP Server: HTTP/2 DoS by Memory Increase | |
| CVE-2025-52434 | Apache Tomcat: APR/Native Connector crash leading to DoS | |
| CVE-2025-52520 | Apache Tomcat: DoS via integer overflow in multipart file upload | |
| CVE-2025-53506 | Apache Tomcat: DoS via excessive h2 streams at connection start |
No comments yet