Files
CVEs-PoC/2016/CVE-2016-8612.md
T
2025-09-29 21:09:30 +02:00

34 lines
1.4 KiB
Markdown

### [CVE-2016-8612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8612)
![](https://img.shields.io/static/v1?label=Product&message=mod_cluster&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=httpd%202.4.23%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20&color=brightgreen)
### Description
Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NeoOniX/5ATTACK
- https://github.com/Samaritin/OSINT
- https://github.com/SecureAxom/strike
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/hrbrmstr/internetdb
- https://github.com/kasem545/vulnsearch
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/syadg123/pigat
- https://github.com/teamssix/pigat
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough
- https://github.com/xxehacker/strike