mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 01:04:30 +00:00
3.6 KiB
3.6 KiB
CVE-2017-7529
Description
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
POC
Reference
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0day666/Vulnerability-verification
- https://github.com/AMEENVKD/Nginx1.10.2Checker
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
- https://github.com/CalebFIN/EXP-CVE-2017-75
- https://github.com/ConstantaNF/RPM
- https://github.com/DSO-Lab/pocscan
- https://github.com/Dekkert/dz6_soft_distribution
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/Janalytics94/anomaly-detection-software
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/MAD-Goat-Project/mad-goat-docs
- https://github.com/MaxSecurity/CVE-2017-7529-POC
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Moazj8/Nginx-Remote-Integer-Overflow-Vulnerability
- https://github.com/NCNU-OpenSource/Web-Vulnerability
- https://github.com/NCSU-DANCE-Research-Group/CDL
- https://github.com/RClueX/Hackerone-Reports
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Shehzadcyber/CVE-2017-7529
- https://github.com/SirEagIe/CVE-2017-7529
- https://github.com/TesterCC/exp_poc_library
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/WenYang-Lai/CVEs
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/adastraaero/OTUS_LinuxProf
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/coolman6942o/-Exploit-CVE-2017-7529
- https://github.com/cved-sources/cve-2017-7529
- https://github.com/cyberharsh/nginx-CVE-2017-7529
- https://github.com/cyberk1w1/CVE-2017-7529
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/daehee/nginx-overflow
- https://github.com/devansh3008/Cve_Finder_2017-7529
- https://github.com/en0f/CVE-2017-7529_PoC
- https://github.com/fardeen-ahmed/Remote-Integer-Overflow-Vulnerability
- https://github.com/fazalurrahman076/POC
- https://github.com/fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit
- https://github.com/gemboxteam/exploit-nginx-1.10.3
- https://github.com/gunh0/kr-vulhub
- https://github.com/hackerhackrat/R-poc
- https://github.com/imhunterand/hackerone-publicy-disclosed
- https://github.com/kenyokaneda/vulnerable-chat-app
- https://github.com/liusec/CVE-2017-7529
- https://github.com/lnick2023/nicenice
- https://github.com/ltfafei/my_POC
- https://github.com/medeirosvf/-exerc-cio-extra-2017-08-08.md-
- https://github.com/merlinepedra/nginxpwner
- https://github.com/mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability
- https://github.com/nicdelhi/CVE-POC
- https://github.com/nihaohello/N-MiddlewareScan
- https://github.com/ninjabuster/exploit-nginx-1.10.3
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/stark0de/nginxpwner
- https://github.com/tdcoming/Vulnerability-engine
- https://github.com/tinsaye/LID-DS-TF
- https://github.com/woods-sega/woodswiki
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/y1ng1996/w8scan