A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
No PoCs from references.
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CAF-Extended/external_honggfuzz
- https://github.com/Corvus-AOSP/android_external_honggfuzz
- https://github.com/ForkLineageOS/external_honggfuzz
- https://github.com/HavocR/external_honggfuzz
- https://github.com/NeoOniX/5ATTACK
- https://github.com/Ozone-OS/external_honggfuzz
- https://github.com/ProtonAOSP-platina/android_external_honggfuzz
- https://github.com/ProtonAOSP/android_external_honggfuzz
- https://github.com/Samaritin/OSINT
- https://github.com/StatiXOS/android_external_honggfuzz
- https://github.com/TheXPerienceProject/android_external_honggfuzz
- https://github.com/TinkerBoard-Android/external-honggfuzz
- https://github.com/TinkerBoard-Android/rockchip-android-external-honggfuzz
- https://github.com/TinkerBoard2-Android/external-honggfuzz
- https://github.com/Tomoms/android_external_honggfuzz
- https://github.com/Wave-Project/external_honggfuzz
- https://github.com/aosp10-public/external_honggfuzz
- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network
- https://github.com/bananadroid/android_external_honggfuzz
- https://github.com/bioly230/THM_Skynet
- https://github.com/crdroid-r/external_honggfuzz
- https://github.com/crdroidandroid/android_external_honggfuzz
- https://github.com/ep-infosec/50_google_honggfuzz
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/google/honggfuzz
- https://github.com/imbaya2466/honggfuzz_READ
- https://github.com/jingpad-bsp/android_external_honggfuzz
- https://github.com/kasem545/vulnsearch
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/lllnx/lllnx
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/r-mirror/android_external_honggfuzz
- https://github.com/random-aosp-stuff/android_external_honggfuzz
- https://github.com/uiop7774/Honggfuzz_mod
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough
- https://github.com/vshaliii/Funbox2-rookie
- https://github.com/yaap/external_honggfuzz