Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/httpd@2.4.6-90.el7_7?arch=3
purl pkg:rpm/redhat/httpd@2.4.6-90.el7_7?arch=3
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 10.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-k4nk-qqxg-s7e6
Aliases:
CVE-2022-22720
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling There are no reported fixed by versions.
VCID-xwnu-h1xh-3bg6
Aliases:
CVE-2021-44790
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:00:39.259390+00:00 RedHat Importer Affected by VCID-xwnu-h1xh-3bg6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44790.json 38.0.0
2026-04-01T13:59:15.078398+00:00 RedHat Importer Affected by VCID-k4nk-qqxg-s7e6 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22720.json 38.0.0