A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://github.com/PawanKumarPandit/Shodan-nrich
- https://github.com/RoseSecurity/Red-Teaming-TTPs
- https://github.com/Solhack/Team_CSI_platform
- https://github.com/austin-lai/External-Penetration-Testing-Holo-Corporate-Network-TryHackMe-Holo-Network
- https://github.com/jdryan1217/Pen-Test-Report
- https://github.com/retr0-13/nrich
- https://github.com/rmtec/modeswitcher
- https://github.com/starnightcyber/vul-info-collect
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough
- https://github.com/vshaliii/Funbox2-rookie
- https://github.com/vshaliii/Vegeta1-Vulhub-Walkthrough