Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apache/httpd@2.4.53
purl pkg:apache/httpd@2.4.53
Next non-vulnerable version 2.4.54
Latest non-vulnerable version 2.4.54
Risk 4.1
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-4d3t-es7p-9qhn
Aliases:
CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
2.4.54
Affected by 0 other vulnerabilities.
VCID-d36c-rrxh-ybgv
Aliases:
CVE-2022-29404
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
2.4.54
Affected by 0 other vulnerabilities.
VCID-dg2r-uz3a-dug5
Aliases:
CVE-2022-28330
Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.
2.4.54
Affected by 0 other vulnerabilities.
VCID-gv84-vfvh-y7hu
Aliases:
CVE-2022-30522
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
2.4.54
Affected by 0 other vulnerabilities.
VCID-hm3f-m22n-u3gy
Aliases:
CVE-2022-30556
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
2.4.54
Affected by 0 other vulnerabilities.
VCID-na94-5565-dyfc
Aliases:
CVE-2022-28614
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the "ap_rputs" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
2.4.54
Affected by 0 other vulnerabilities.
VCID-p2a1-afnh-7qca
Aliases:
CVE-2022-31813
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
2.4.54
Affected by 0 other vulnerabilities.
VCID-qm7e-n9ay-hufy
Aliases:
CVE-2022-26377
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
2.4.54
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-g55m-t4s1-nfhv Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions. CVE-2022-23943
VCID-k4nk-qqxg-s7e6 Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling CVE-2022-22720
VCID-pnc8-bb23-vqh1 A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier. CVE-2022-22719
VCID-xfm9-e5nr-wyat If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier. CVE-2022-22721

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:36:23.459787+00:00 Apache HTTPD Importer Affected by VCID-p2a1-afnh-7qca https://httpd.apache.org/security/json/CVE-2022-31813.json 38.0.0
2026-04-01T12:36:23.445065+00:00 Apache HTTPD Importer Affected by VCID-hm3f-m22n-u3gy https://httpd.apache.org/security/json/CVE-2022-30556.json 38.0.0
2026-04-01T12:36:23.428737+00:00 Apache HTTPD Importer Affected by VCID-gv84-vfvh-y7hu https://httpd.apache.org/security/json/CVE-2022-30522.json 38.0.0
2026-04-01T12:36:23.412786+00:00 Apache HTTPD Importer Affected by VCID-d36c-rrxh-ybgv https://httpd.apache.org/security/json/CVE-2022-29404.json 38.0.0
2026-04-01T12:36:23.397988+00:00 Apache HTTPD Importer Affected by VCID-4d3t-es7p-9qhn https://httpd.apache.org/security/json/CVE-2022-28615.json 38.0.0
2026-04-01T12:36:23.381293+00:00 Apache HTTPD Importer Affected by VCID-na94-5565-dyfc https://httpd.apache.org/security/json/CVE-2022-28614.json 38.0.0
2026-04-01T12:36:23.366555+00:00 Apache HTTPD Importer Affected by VCID-dg2r-uz3a-dug5 https://httpd.apache.org/security/json/CVE-2022-28330.json 38.0.0
2026-04-01T12:36:23.351295+00:00 Apache HTTPD Importer Affected by VCID-qm7e-n9ay-hufy https://httpd.apache.org/security/json/CVE-2022-26377.json 38.0.0
2026-04-01T12:36:23.338440+00:00 Apache HTTPD Importer Fixing VCID-g55m-t4s1-nfhv https://httpd.apache.org/security/json/CVE-2022-23943.json 38.0.0
2026-04-01T12:36:23.323617+00:00 Apache HTTPD Importer Fixing VCID-xfm9-e5nr-wyat https://httpd.apache.org/security/json/CVE-2022-22721.json 38.0.0
2026-04-01T12:36:23.308725+00:00 Apache HTTPD Importer Fixing VCID-k4nk-qqxg-s7e6 https://httpd.apache.org/security/json/CVE-2022-22720.json 38.0.0
2026-04-01T12:36:23.292203+00:00 Apache HTTPD Importer Fixing VCID-pnc8-bb23-vqh1 https://httpd.apache.org/security/json/CVE-2022-22719.json 38.0.0