Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-3192 PoC — Apache HTTP Server拒绝服务漏洞

Source
Associated Vulnerability
Title:Apache HTTP Server拒绝服务漏洞 (CVE-2011-3192)
Description:The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
Readme
# CVE-2011-3192
Run it using python 3.7 or 3.10 (tested on it)
1. git clone https://github.com/futurezayka/CVE-2011-3192.git
2. cd ./CVE-2011-3192
3. pip install -r requirements.txt
4. python3 exploit.py host tasks (example python3 exploit.py https://example.com 50)

File Snapshot

[4.0K] /data/pocs/51c2758e256b53e78a4946f42ff7d82e4e211599 ├── [4.0K] exploit.py ├── [ 268] README.md └── [ 333] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →