Описание
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.4.58-1ubuntu8.1 |
| esm-infra-legacy/trusty | needs-triage | |
| esm-infra/bionic | released | 2.4.29-1ubuntu4.27+esm2 |
| esm-infra/focal | released | 2.4.41-4ubuntu3.17 |
| esm-infra/xenial | released | 2.4.18-2ubuntu3.17+esm12 |
| focal | released | 2.4.41-4ubuntu3.17 |
| jammy | released | 2.4.52-1ubuntu4.9 |
| mantic | released | 2.4.57-2ubuntu2.4 |
| noble | released | 2.4.58-1ubuntu8.1 |
| oracular | released | 2.4.58-1ubuntu8.1 |
Показывать по
Ссылки на источники
EPSS
7.3 High
CVSS3
Связанные уязвимости
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Faulty input validation in the core of Apache allows malicious or expl ...
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
EPSS
7.3 High
CVSS3