mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
80 lines
3.6 KiB
Markdown
80 lines
3.6 KiB
Markdown
![]() |
### [CVE-2017-7529](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7529)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://seclists.org/fulldisclosure/2021/Sep/36
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0day404/vulnerability-poc
|
||
|
- https://github.com/0day666/Vulnerability-verification
|
||
|
- https://github.com/AMEENVKD/Nginx1.10.2Checker
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ARPSyndicate/kenzer-templates
|
||
|
- https://github.com/ArrestX/--POC
|
||
|
- https://github.com/CalebFIN/EXP-CVE-2017-75
|
||
|
- https://github.com/ConstantaNF/RPM
|
||
|
- https://github.com/DSO-Lab/pocscan
|
||
|
- https://github.com/Dekkert/dz6_soft_distribution
|
||
|
- https://github.com/Elsfa7-110/kenzer-templates
|
||
|
- https://github.com/Janalytics94/anomaly-detection-software
|
||
|
- https://github.com/KayCHENvip/vulnerability-poc
|
||
|
- https://github.com/MAD-Goat-Project/mad-goat-docs
|
||
|
- https://github.com/MaxSecurity/CVE-2017-7529-POC
|
||
|
- https://github.com/Miraitowa70/POC-Notes
|
||
|
- https://github.com/Moazj8/Nginx-Remote-Integer-Overflow-Vulnerability
|
||
|
- https://github.com/NCNU-OpenSource/Web-Vulnerability
|
||
|
- https://github.com/NCSU-DANCE-Research-Group/CDL
|
||
|
- https://github.com/RClueX/Hackerone-Reports
|
||
|
- https://github.com/SexyBeast233/SecBooks
|
||
|
- https://github.com/Shehzadcyber/CVE-2017-7529
|
||
|
- https://github.com/SirEagIe/CVE-2017-7529
|
||
|
- https://github.com/TesterCC/exp_poc_library
|
||
|
- https://github.com/Threekiii/Awesome-Exploit
|
||
|
- https://github.com/Threekiii/Awesome-POC
|
||
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
||
|
- https://github.com/WenYang-Lai/CVEs
|
||
|
- https://github.com/Zero094/Vulnerability-verification
|
||
|
- https://github.com/adastraaero/OTUS_LinuxProf
|
||
|
- https://github.com/bakery312/Vulhub-Reproduce
|
||
|
- https://github.com/coolman6942o/-Exploit-CVE-2017-7529
|
||
|
- https://github.com/cved-sources/cve-2017-7529
|
||
|
- https://github.com/cyberharsh/nginx-CVE-2017-7529
|
||
|
- https://github.com/cyberk1w1/CVE-2017-7529
|
||
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
||
|
- https://github.com/daehee/nginx-overflow
|
||
|
- https://github.com/devansh3008/Cve_Finder_2017-7529
|
||
|
- https://github.com/en0f/CVE-2017-7529_PoC
|
||
|
- https://github.com/fardeen-ahmed/Remote-Integer-Overflow-Vulnerability
|
||
|
- https://github.com/fazalurrahman076/POC
|
||
|
- https://github.com/fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit
|
||
|
- https://github.com/gemboxteam/exploit-nginx-1.10.3
|
||
|
- https://github.com/gunh0/kr-vulhub
|
||
|
- https://github.com/hackerhackrat/R-poc
|
||
|
- https://github.com/imhunterand/hackerone-publicy-disclosed
|
||
|
- https://github.com/kenyokaneda/vulnerable-chat-app
|
||
|
- https://github.com/liusec/CVE-2017-7529
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/ltfafei/my_POC
|
||
|
- https://github.com/medeirosvf/-exerc-cio-extra-2017-08-08.md-
|
||
|
- https://github.com/merlinepedra/nginxpwner
|
||
|
- https://github.com/mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability
|
||
|
- https://github.com/nicdelhi/CVE-POC
|
||
|
- https://github.com/nihaohello/N-MiddlewareScan
|
||
|
- https://github.com/ninjabuster/exploit-nginx-1.10.3
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/stark0de/nginxpwner
|
||
|
- https://github.com/tdcoming/Vulnerability-engine
|
||
|
- https://github.com/tinsaye/LID-DS-TF
|
||
|
- https://github.com/woods-sega/woodswiki
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
- https://github.com/y1ng1996/w8scan
|
||
|
|