Files
CVEs-PoC/2017/CVE-2017-7659.md
T
2025-09-29 21:09:30 +02:00

63 lines
3.0 KiB
Markdown

### [CVE-2017-7659](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.4.24%2C%202.4.25%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CAF-Extended/external_honggfuzz
- https://github.com/Corvus-AOSP/android_external_honggfuzz
- https://github.com/DennissimOS/platform_external_honggfuzz
- https://github.com/ForkLineageOS/external_honggfuzz
- https://github.com/HavocR/external_honggfuzz
- https://github.com/NeoOniX/5ATTACK
- https://github.com/Ozone-OS/external_honggfuzz
- https://github.com/PawanKumarPandit/Shodan-nrich
- https://github.com/ProtonAOSP-platina/android_external_honggfuzz
- https://github.com/ProtonAOSP/android_external_honggfuzz
- https://github.com/RoseSecurity-Research/Red-Teaming-TTPs
- https://github.com/RoseSecurity/Red-Teaming-TTPs
- https://github.com/StatiXOS/android_external_honggfuzz
- https://github.com/TheXPerienceProject/android_external_honggfuzz
- https://github.com/TinkerBoard-Android/external-honggfuzz
- https://github.com/TinkerBoard-Android/rockchip-android-external-honggfuzz
- https://github.com/TinkerBoard2-Android/external-honggfuzz
- https://github.com/TinkerEdgeR-Android/external_honggfuzz
- https://github.com/Tomoms/android_external_honggfuzz
- https://github.com/Wave-Project/external_honggfuzz
- https://github.com/Xorlent/Red-Teaming-TTPs
- https://github.com/aosp-caf-upstream/platform_external_honggfuzz
- https://github.com/aosp10-public/external_honggfuzz
- https://github.com/bananadroid/android_external_honggfuzz
- https://github.com/bartholomex-x/nrich
- https://github.com/crdroid-r/external_honggfuzz
- https://github.com/crdroidandroid/android_external_honggfuzz
- https://github.com/ep-infosec/50_google_honggfuzz
- https://github.com/google/honggfuzz
- https://github.com/imbaya2466/honggfuzz_READ
- https://github.com/jingpad-bsp/android_external_honggfuzz
- https://github.com/khadas/android_external_honggfuzz
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/lllnx/lllnx
- https://github.com/mitchelmcfarland/4240-port-scanner
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/q40603/Continuous-Invivo-Fuzz
- https://github.com/r-mirror/android_external_honggfuzz
- https://github.com/r3p3r/nixawk-honggfuzz
- https://github.com/random-aosp-stuff/android_external_honggfuzz
- https://github.com/retr0-13/nrich
- https://github.com/uiop7774/Honggfuzz_mod
- https://github.com/xinity/shodan-nrich
- https://github.com/yaap/external_honggfuzz