Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-servers/apache@2.4.56
Typeebuild
Namespacewww-servers
Nameapache
Version2.4.56
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.4.62
Latest_non_vulnerable_version2.4.62
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4c3m-m6ku-kbhq
vulnerability_id VCID-4c3m-m6ku-kbhq
summary
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.

Special characters in the origin response header can truncate/split the response forwarded to the client.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27522.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27522
reference_id
reference_type
scores
0
value 0.00781
scoring_system epss
scoring_elements 0.73743
published_at 2026-04-18T12:55:00Z
1
value 0.00781
scoring_system epss
scoring_elements 0.73683
published_at 2026-04-08T12:55:00Z
2
value 0.00781
scoring_system epss
scoring_elements 0.73734
published_at 2026-04-16T12:55:00Z
3
value 0.00781
scoring_system epss
scoring_elements 0.7369
published_at 2026-04-13T12:55:00Z
4
value 0.00781
scoring_system epss
scoring_elements 0.73699
published_at 2026-04-12T12:55:00Z
5
value 0.00781
scoring_system epss
scoring_elements 0.73717
published_at 2026-04-11T12:55:00Z
6
value 0.00781
scoring_system epss
scoring_elements 0.73651
published_at 2026-04-02T12:55:00Z
7
value 0.00781
scoring_system epss
scoring_elements 0.73696
published_at 2026-04-09T12:55:00Z
8
value 0.00781
scoring_system epss
scoring_elements 0.73675
published_at 2026-04-04T12:55:00Z
9
value 0.00781
scoring_system epss
scoring_elements 0.73647
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27522
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/apache/httpd/commit/d753ea76b5972a85349b68c31b59d04c60014f2d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/httpd/commit/d753ea76b5972a85349b68c31b59d04c60014f2d
9
reference_url https://github.com/unbit/uwsgi
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/unbit/uwsgi
10
reference_url https://github.com/unbit/uwsgi/commit/58ee1df31fa9e9af106aaeabb82374c36b433822
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/unbit/uwsgi/commit/58ee1df31fa9e9af106aaeabb82374c36b433822
11
reference_url https://github.com/unbit/uwsgi/commit/acb03530aaaeaa810f28a5b64da619525940f569
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/unbit/uwsgi/commit/acb03530aaaeaa810f28a5b64da619525940f569
12
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-23T16:41:55Z/
url https://httpd.apache.org/security/vulnerabilities_24.html
13
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-23T16:41:55Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
14
reference_url https://security.gentoo.org/glsa/202309-01
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-23T16:41:55Z/
url https://security.gentoo.org/glsa/202309-01
15
reference_url https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.22.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.22.html
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
reference_id 1032476
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176211
reference_id 2176211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176211
18
reference_url https://httpd.apache.org/security/json/CVE-2023-27522.json
reference_id CVE-2023-27522
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2023-27522.json
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27522
reference_id CVE-2023-27522
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-27522
20
reference_url https://github.com/advisories/GHSA-vcph-37mh-fqrh
reference_id GHSA-vcph-37mh-fqrh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vcph-37mh-fqrh
21
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
22
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
23
reference_url https://access.redhat.com/errata/RHSA-2023:5049
reference_id RHSA-2023:5049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5049
24
reference_url https://access.redhat.com/errata/RHSA-2023:5050
reference_id RHSA-2023:5050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5050
25
reference_url https://access.redhat.com/errata/RHSA-2023:6403
reference_id RHSA-2023:6403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6403
26
reference_url https://access.redhat.com/errata/RHSA-2024:4504
reference_id RHSA-2024:4504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4504
27
reference_url https://usn.ubuntu.com/5942-1/
reference_id USN-5942-1
reference_type
scores
url https://usn.ubuntu.com/5942-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.4.56
purl pkg:ebuild/www-servers/apache@2.4.56
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.4.56
aliases CVE-2023-27522, GHSA-vcph-37mh-fqrh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c3m-m6ku-kbhq
1
url VCID-6qk8-1cj1-4fh7
vulnerability_id VCID-6qk8-1cj1-4fh7
summary Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36760.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36760
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.52588
published_at 2026-04-18T12:55:00Z
1
value 0.00291
scoring_system epss
scoring_elements 0.52528
published_at 2026-04-08T12:55:00Z
2
value 0.00291
scoring_system epss
scoring_elements 0.52522
published_at 2026-04-09T12:55:00Z
3
value 0.00291
scoring_system epss
scoring_elements 0.52573
published_at 2026-04-11T12:55:00Z
4
value 0.00291
scoring_system epss
scoring_elements 0.52558
published_at 2026-04-12T12:55:00Z
5
value 0.00291
scoring_system epss
scoring_elements 0.52542
published_at 2026-04-13T12:55:00Z
6
value 0.00291
scoring_system epss
scoring_elements 0.52581
published_at 2026-04-16T12:55:00Z
7
value 0.00291
scoring_system epss
scoring_elements 0.52481
published_at 2026-04-02T12:55:00Z
8
value 0.00291
scoring_system epss
scoring_elements 0.52508
published_at 2026-04-04T12:55:00Z
9
value 0.00291
scoring_system epss
scoring_elements 0.52475
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161777
reference_id 2161777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161777
9
reference_url https://security.archlinux.org/AVG-2824
reference_id AVG-2824
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2824
10
reference_url https://httpd.apache.org/security/json/CVE-2022-36760.json
reference_id CVE-2022-36760
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2022-36760.json
11
reference_url https://access.redhat.com/errata/RHSA-2023:0852
reference_id RHSA-2023:0852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0852
12
reference_url https://access.redhat.com/errata/RHSA-2023:0970
reference_id RHSA-2023:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0970
13
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
14
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
15
reference_url https://usn.ubuntu.com/5834-1/
reference_id USN-5834-1
reference_type
scores
url https://usn.ubuntu.com/5834-1/
16
reference_url https://usn.ubuntu.com/5839-1/
reference_id USN-5839-1
reference_type
scores
url https://usn.ubuntu.com/5839-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.4.56
purl pkg:ebuild/www-servers/apache@2.4.56
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.4.56
aliases CVE-2022-36760
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qk8-1cj1-4fh7
2
url VCID-edvy-cern-6kcu
vulnerability_id VCID-edvy-cern-6kcu
summary
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.




Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
 or ProxyPassMatch in which a non-specific pattern matches
 some portion of the user-supplied request-target (URL) data and is then
 re-inserted into the proxied request-target using variable 
substitution. For example, something like:




RewriteEngine on
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ http://example.com:8080/


Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25690.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25690.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25690
reference_id
reference_type
scores
0
value 0.68183
scoring_system epss
scoring_elements 0.98606
published_at 2026-04-18T12:55:00Z
1
value 0.68183
scoring_system epss
scoring_elements 0.98595
published_at 2026-04-08T12:55:00Z
2
value 0.68183
scoring_system epss
scoring_elements 0.98596
published_at 2026-04-09T12:55:00Z
3
value 0.68183
scoring_system epss
scoring_elements 0.98598
published_at 2026-04-11T12:55:00Z
4
value 0.68183
scoring_system epss
scoring_elements 0.98599
published_at 2026-04-12T12:55:00Z
5
value 0.68183
scoring_system epss
scoring_elements 0.986
published_at 2026-04-13T12:55:00Z
6
value 0.68183
scoring_system epss
scoring_elements 0.98605
published_at 2026-04-16T12:55:00Z
7
value 0.68183
scoring_system epss
scoring_elements 0.98587
published_at 2026-04-02T12:55:00Z
8
value 0.68183
scoring_system epss
scoring_elements 0.98591
published_at 2026-04-04T12:55:00Z
9
value 0.68183
scoring_system epss
scoring_elements 0.98592
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25690
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
reference_id 1032476
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176209
reference_id 2176209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176209
10
reference_url http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
reference_id Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:37:02Z/
url http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
11
reference_url https://httpd.apache.org/security/json/CVE-2023-25690.json
reference_id CVE-2023-25690
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2023-25690.json
12
reference_url https://access.redhat.com/errata/RHSA-2023:1547
reference_id RHSA-2023:1547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1547
13
reference_url https://access.redhat.com/errata/RHSA-2023:1593
reference_id RHSA-2023:1593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1593
14
reference_url https://access.redhat.com/errata/RHSA-2023:1596
reference_id RHSA-2023:1596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1596
15
reference_url https://access.redhat.com/errata/RHSA-2023:1597
reference_id RHSA-2023:1597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1597
16
reference_url https://access.redhat.com/errata/RHSA-2023:1670
reference_id RHSA-2023:1670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1670
17
reference_url https://access.redhat.com/errata/RHSA-2023:1672
reference_id RHSA-2023:1672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1672
18
reference_url https://access.redhat.com/errata/RHSA-2023:1673
reference_id RHSA-2023:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1673
19
reference_url https://access.redhat.com/errata/RHSA-2023:1916
reference_id RHSA-2023:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1916
20
reference_url https://access.redhat.com/errata/RHSA-2023:3292
reference_id RHSA-2023:3292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3292
21
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
22
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
23
reference_url https://usn.ubuntu.com/5942-1/
reference_id USN-5942-1
reference_type
scores
url https://usn.ubuntu.com/5942-1/
24
reference_url https://usn.ubuntu.com/5942-2/
reference_id USN-5942-2
reference_type
scores
url https://usn.ubuntu.com/5942-2/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.4.56
purl pkg:ebuild/www-servers/apache@2.4.56
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.4.56
aliases CVE-2023-25690
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edvy-cern-6kcu
3
url VCID-fz8c-b8r4-1yb8
vulnerability_id VCID-fz8c-b8r4-1yb8
summary
A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.

This issue affects Apache HTTP Server 2.4.54 and earlier.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-20001.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-20001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-20001
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63051
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63196
published_at 2026-04-18T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63191
published_at 2026-04-11T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63176
published_at 2026-04-12T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63154
published_at 2026-04-13T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63188
published_at 2026-04-16T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6311
published_at 2026-04-02T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.6314
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63105
published_at 2026-04-07T12:55:00Z
9
value 0.00439
scoring_system epss
scoring_elements 0.63157
published_at 2026-04-08T12:55:00Z
10
value 0.00439
scoring_system epss
scoring_elements 0.63174
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-20001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161774
reference_id 2161774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161774
9
reference_url https://security.archlinux.org/AVG-2824
reference_id AVG-2824
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2824
10
reference_url https://httpd.apache.org/security/json/CVE-2006-20001.json
reference_id CVE-2006-20001
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2006-20001.json
11
reference_url https://access.redhat.com/errata/RHSA-2023:0852
reference_id RHSA-2023:0852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0852
12
reference_url https://access.redhat.com/errata/RHSA-2023:0970
reference_id RHSA-2023:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0970
13
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
14
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
15
reference_url https://usn.ubuntu.com/5834-1/
reference_id USN-5834-1
reference_type
scores
url https://usn.ubuntu.com/5834-1/
16
reference_url https://usn.ubuntu.com/5839-1/
reference_id USN-5839-1
reference_type
scores
url https://usn.ubuntu.com/5839-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.4.56
purl pkg:ebuild/www-servers/apache@2.4.56
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.4.56
aliases CVE-2006-20001
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fz8c-b8r4-1yb8
4
url VCID-htfx-mahy-9kde
vulnerability_id VCID-htfx-mahy-9kde
summary Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37436.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37436
reference_id
reference_type
scores
0
value 0.00463
scoring_system epss
scoring_elements 0.64235
published_at 2026-04-04T12:55:00Z
1
value 0.00463
scoring_system epss
scoring_elements 0.64208
published_at 2026-04-02T12:55:00Z
2
value 0.00463
scoring_system epss
scoring_elements 0.64196
published_at 2026-04-07T12:55:00Z
3
value 0.00463
scoring_system epss
scoring_elements 0.64246
published_at 2026-04-08T12:55:00Z
4
value 0.00463
scoring_system epss
scoring_elements 0.64262
published_at 2026-04-09T12:55:00Z
5
value 0.00463
scoring_system epss
scoring_elements 0.64275
published_at 2026-04-11T12:55:00Z
6
value 0.00463
scoring_system epss
scoring_elements 0.64264
published_at 2026-04-12T12:55:00Z
7
value 0.00463
scoring_system epss
scoring_elements 0.64237
published_at 2026-04-13T12:55:00Z
8
value 0.00539
scoring_system epss
scoring_elements 0.67617
published_at 2026-04-16T12:55:00Z
9
value 0.00539
scoring_system epss
scoring_elements 0.6763
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37436
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161773
reference_id 2161773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161773
9
reference_url https://security.archlinux.org/AVG-2824
reference_id AVG-2824
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2824
10
reference_url https://httpd.apache.org/security/json/CVE-2022-37436.json
reference_id CVE-2022-37436
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2022-37436.json
11
reference_url https://access.redhat.com/errata/RHSA-2023:0852
reference_id RHSA-2023:0852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0852
12
reference_url https://access.redhat.com/errata/RHSA-2023:0970
reference_id RHSA-2023:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0970
13
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
14
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
15
reference_url https://usn.ubuntu.com/5839-1/
reference_id USN-5839-1
reference_type
scores
url https://usn.ubuntu.com/5839-1/
16
reference_url https://usn.ubuntu.com/5839-2/
reference_id USN-5839-2
reference_type
scores
url https://usn.ubuntu.com/5839-2/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.4.56
purl pkg:ebuild/www-servers/apache@2.4.56
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.4.56
aliases CVE-2022-37436
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htfx-mahy-9kde
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.4.56