### [CVE-2018-1301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Possible%20out%20of%20bound%20access%20after%20failure%20in%20reading%20the%20HTTP%20request&color=brighgreen) ### Description A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage. ### POC #### Reference No PoCs from references. #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/ARPSyndicate/cvemon - https://github.com/CAF-Extended/external_honggfuzz - https://github.com/Corvus-AOSP/android_external_honggfuzz - https://github.com/ForkLineageOS/external_honggfuzz - https://github.com/HavocR/external_honggfuzz - https://github.com/Ozone-OS/external_honggfuzz - https://github.com/ProtonAOSP-platina/android_external_honggfuzz - https://github.com/ProtonAOSP/android_external_honggfuzz - https://github.com/StatiXOS/android_external_honggfuzz - https://github.com/TheXPerienceProject/android_external_honggfuzz - https://github.com/TinkerBoard-Android/external-honggfuzz - https://github.com/TinkerBoard-Android/rockchip-android-external-honggfuzz - https://github.com/TinkerBoard2-Android/external-honggfuzz - https://github.com/Tomoms/android_external_honggfuzz - https://github.com/Wave-Project/external_honggfuzz - https://github.com/aosp10-public/external_honggfuzz - https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network - https://github.com/bananadroid/android_external_honggfuzz - https://github.com/bioly230/THM_Skynet - https://github.com/crdroid-r/external_honggfuzz - https://github.com/crdroidandroid/android_external_honggfuzz - https://github.com/ep-infosec/50_google_honggfuzz - https://github.com/firatesatoglu/shodanSearch - https://github.com/google/honggfuzz - https://github.com/imbaya2466/honggfuzz_READ - https://github.com/jingpad-bsp/android_external_honggfuzz - https://github.com/kasem545/vulnsearch - https://github.com/lllnx/lllnx - https://github.com/random-aosp-stuff/android_external_honggfuzz - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough - https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough - https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough - https://github.com/vshaliii/Funbox2-rookie - https://github.com/yaap/external_honggfuzz