Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.
This issue affects Apache HTTP Server: through 2.4.58.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 |
Tue, 05 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache http Server |
|
Weaknesses | CWE-1284 | |
CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache http Server |
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 24 Sep 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat jboss Core Services
|
|
CPEs | cpe:/a:redhat:jboss_core_services:1 cpe:/a:redhat:jboss_core_services:1::el7 cpe:/a:redhat:jboss_core_services:1::el8 |
|
Vendors & Products |
Redhat jboss Core Services
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:02:32.587Z
Reserved: 2023-07-24T17:51:18.042Z
Link: CVE-2023-38709

Updated: 2024-08-02T17:46:56.949Z

Status : Awaiting Analysis
Published: 2024-04-04T20:15:08.047
Modified: 2024-11-21T08:14:05.917
Link: CVE-2023-38709
