The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library prior to 1.3.9, as used in the Apache HTTP Server prior to 2.2.14 and other products, does not properly handle errors, which allows remote malicious users to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
Most Upvoted Vulmon Research Post
There is no Researcher post for this vulnerability
Would you like to share something about it?
Sign up now to share your knowledge with the
community.
Network reconnaissance and vulnerability assessment tools.
ReconScan
The purpose of this project is to develop scripts that can be useful in the pentesting workflow, be it for VulnHub VMs, CTFs, hands-on certificates, or real-world targets
The project currently consists of two major components: a script invoking and aggregating the results of existing tools, and a second script for automated analysis of the aforementioned results from
Network reconnaissance and vulnerability assessment tools.
ReconScan
The purpose of this project is to develop scripts that can be useful in the pentesting workflow, be it for VulnHub VMs, CTFs, hands-on certificates, or real-world targets
The project currently consists of two major components: a script invoking and aggregating the results of existing tools, and a second script for automated analysis of the aforementioned results from
Network reconnaissance and vulnerability assessment tools.
ReconScan
The purpose of this project is to develop scripts that can be useful in the pentesting workflow, be it for VulnHub VMs, CTFs, hands-on certificates, or real-world targets
The project currently consists of two major components: a script invoking and aggregating the results of existing tools, and a second script for automated analysis of the aforementioned results from
ReconScan
The purpose of this project is to develop scripts that can be useful in the pentesting workflow, be it for VulnHub VMs, CTFs, hands-on certificates, or real-world targets
The project currently consists of two major components: a script invoking and aggregating the results of existing tools, and a second script for automated analysis of the aforementioned results from
Strike
A python tool to quickly analyze all IPs and see which ones have open ports and vulnerabilities
Installation
apt-get install python3
git clone githubcom/SecureAxom/strike
cd strike
pip3 install -r requirementstxt
python3 strikepy
Usages
python3 strikepy -h
python3 strikepy -t 20891