### [CVE-2017-7529](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7529) ![](https://img.shields.io/static/v1?label=Product&message=nginx&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190&color=brighgreen) ### Description Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. ### POC #### Reference - http://seclists.org/fulldisclosure/2021/Sep/36 #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0day666/Vulnerability-verification - https://github.com/AMEENVKD/Nginx1.10.2Checker - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ArrestX/--POC - https://github.com/CalebFIN/EXP-CVE-2017-75 - https://github.com/ConstantaNF/RPM - https://github.com/DSO-Lab/pocscan - https://github.com/Dekkert/dz6_soft_distribution - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/Janalytics94/anomaly-detection-software - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/MAD-Goat-Project/mad-goat-docs - https://github.com/MaxSecurity/CVE-2017-7529-POC - https://github.com/Miraitowa70/POC-Notes - https://github.com/Moazj8/Nginx-Remote-Integer-Overflow-Vulnerability - https://github.com/NCNU-OpenSource/Web-Vulnerability - https://github.com/NCSU-DANCE-Research-Group/CDL - https://github.com/RClueX/Hackerone-Reports - https://github.com/SexyBeast233/SecBooks - https://github.com/Shehzadcyber/CVE-2017-7529 - https://github.com/SirEagIe/CVE-2017-7529 - https://github.com/TesterCC/exp_poc_library - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/WenYang-Lai/CVEs - https://github.com/Zero094/Vulnerability-verification - https://github.com/adastraaero/OTUS_LinuxProf - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/coolman6942o/-Exploit-CVE-2017-7529 - https://github.com/cved-sources/cve-2017-7529 - https://github.com/cyberharsh/nginx-CVE-2017-7529 - https://github.com/cyberk1w1/CVE-2017-7529 - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/daehee/nginx-overflow - https://github.com/devansh3008/Cve_Finder_2017-7529 - https://github.com/en0f/CVE-2017-7529_PoC - https://github.com/fardeen-ahmed/Remote-Integer-Overflow-Vulnerability - https://github.com/fazalurrahman076/POC - https://github.com/fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit - https://github.com/gemboxteam/exploit-nginx-1.10.3 - https://github.com/gunh0/kr-vulhub - https://github.com/hackerhackrat/R-poc - https://github.com/imhunterand/hackerone-publicy-disclosed - https://github.com/kenyokaneda/vulnerable-chat-app - https://github.com/liusec/CVE-2017-7529 - https://github.com/lnick2023/nicenice - https://github.com/ltfafei/my_POC - https://github.com/medeirosvf/-exerc-cio-extra-2017-08-08.md- - https://github.com/merlinepedra/nginxpwner - https://github.com/mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability - https://github.com/nicdelhi/CVE-POC - https://github.com/nihaohello/N-MiddlewareScan - https://github.com/ninjabuster/exploit-nginx-1.10.3 - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/stark0de/nginxpwner - https://github.com/tdcoming/Vulnerability-engine - https://github.com/tinsaye/LID-DS-TF - https://github.com/woods-sega/woodswiki - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/y1ng1996/w8scan