HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects versions 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.
Reporter | Title | Published | Views | Family All 150 |
---|---|---|---|---|
![]() | Rocky Linux 8 : httpd:2.4 (RLSA-2023:5050) | 19 Sep 202300:00 | – | nessus |
![]() | AlmaLinux 8 : httpd:2.4 (ALSA-2023:5050) | 12 Sep 202300:00 | – | nessus |
![]() | RHEL 9 : httpd (RHSA-2024:4504) | 11 Jul 202400:00 | – | nessus |
![]() | CBL Mariner 2.0 Security Update: httpd (CVE-2023-27522) | 28 Mar 202300:00 | – | nessus |
![]() | Photon OS 5.0: Uwsgi PHSA-2023-5.0-0083 | 24 Jul 202400:00 | – | nessus |
![]() | CentOS 8 : httpd:2.4 (CESA-2023:5050) | 11 Sep 202300:00 | – | nessus |
![]() | RHEL 8 : httpd:2.4 (RHSA-2023:5050) | 11 Sep 202300:00 | – | nessus |
![]() | RHEL 8 : httpd:2.4 (RHSA-2023:5049) | 11 Sep 202300:00 | – | nessus |
![]() | RHEL 9 : httpd and mod_http2 (RHSA-2023:6403) | 7 Nov 202300:00 | – | nessus |
![]() | Photon OS 4.0: Uwsgi PHSA-2023-4.0-0461 | 24 Jul 202400:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo