### [CVE-2016-8612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8612) ![](https://img.shields.io/static/v1?label=Product&message=mod_cluster&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20httpd%202.4.23%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20&color=brighgreen) ### Description Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process. ### POC #### Reference No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon - https://github.com/SecureAxom/strike - https://github.com/bioly230/THM_Skynet - https://github.com/firatesatoglu/shodanSearch - https://github.com/hrbrmstr/internetdb - https://github.com/kasem545/vulnsearch - https://github.com/syadg123/pigat - https://github.com/teamssix/pigat - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough - https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough - https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough - https://github.com/xxehacker/strike