A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://github.com/20142995/nuclei-templates
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/NeoOniX/5ATTACK
- https://github.com/PierreChrd/py-projet-tut
- https://github.com/Samaritin/OSINT
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/jkiala2/Projet_etude_M1
- https://github.com/kasem545/vulnsearch
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/zxTyphoon/Pentest