### [CVE-2017-7659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.4.24%2C%202.4.25%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/ARPSyndicate/cvemon - https://github.com/CAF-Extended/external_honggfuzz - https://github.com/Corvus-AOSP/android_external_honggfuzz - https://github.com/DennissimOS/platform_external_honggfuzz - https://github.com/ForkLineageOS/external_honggfuzz - https://github.com/HavocR/external_honggfuzz - https://github.com/NeoOniX/5ATTACK - https://github.com/Ozone-OS/external_honggfuzz - https://github.com/PawanKumarPandit/Shodan-nrich - https://github.com/ProtonAOSP-platina/android_external_honggfuzz - https://github.com/ProtonAOSP/android_external_honggfuzz - https://github.com/RoseSecurity-Research/Red-Teaming-TTPs - https://github.com/RoseSecurity/Red-Teaming-TTPs - https://github.com/StatiXOS/android_external_honggfuzz - https://github.com/TheXPerienceProject/android_external_honggfuzz - https://github.com/TinkerBoard-Android/external-honggfuzz - https://github.com/TinkerBoard-Android/rockchip-android-external-honggfuzz - https://github.com/TinkerBoard2-Android/external-honggfuzz - https://github.com/TinkerEdgeR-Android/external_honggfuzz - https://github.com/Tomoms/android_external_honggfuzz - https://github.com/Wave-Project/external_honggfuzz - https://github.com/Xorlent/Red-Teaming-TTPs - https://github.com/aosp-caf-upstream/platform_external_honggfuzz - https://github.com/aosp10-public/external_honggfuzz - https://github.com/bananadroid/android_external_honggfuzz - https://github.com/bartholomex-x/nrich - https://github.com/crdroid-r/external_honggfuzz - https://github.com/crdroidandroid/android_external_honggfuzz - https://github.com/ep-infosec/50_google_honggfuzz - https://github.com/google/honggfuzz - https://github.com/imbaya2466/honggfuzz_READ - https://github.com/jingpad-bsp/android_external_honggfuzz - https://github.com/khadas/android_external_honggfuzz - https://github.com/lekctut/sdb-hw-13-01 - https://github.com/lllnx/lllnx - https://github.com/mitchelmcfarland/4240-port-scanner - https://github.com/pedr0alencar/vlab-metasploitable2 - https://github.com/q40603/Continuous-Invivo-Fuzz - https://github.com/r-mirror/android_external_honggfuzz - https://github.com/r3p3r/nixawk-honggfuzz - https://github.com/random-aosp-stuff/android_external_honggfuzz - https://github.com/retr0-13/nrich - https://github.com/uiop7774/Honggfuzz_mod - https://github.com/xinity/shodan-nrich - https://github.com/yaap/external_honggfuzz