Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-4?arch=el7jbcs
purl pkg:rpm/redhat/jbcs-httpd24-mod_proxy_cluster@1.3.22-4?arch=el7jbcs
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 3.4
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-9tez-97xg-z3bs
Aliases:
CVE-2025-49812
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade. There are no reported fixed by versions.
VCID-r471-g9xs-sbga
Aliases:
CVE-2025-23048
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host. There are no reported fixed by versions.
VCID-tyyt-k2cb-dygb
Aliases:
CVE-2025-47947
modsecurity: ModSecurity Has Possible DoS Vulnerability There are no reported fixed by versions.
VCID-zxet-n94k-57ge
Aliases:
CVE-2025-49630
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on". There are no reported fixed by versions.
VCID-zyyh-n42k-8bhr
Aliases:
CVE-2024-47252
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:39:57.103688+00:00 RedHat Importer Affected by VCID-tyyt-k2cb-dygb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47947.json 38.0.0
2026-04-01T13:38:36.076864+00:00 RedHat Importer Affected by VCID-zyyh-n42k-8bhr https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47252.json 38.0.0
2026-04-01T13:38:35.563843+00:00 RedHat Importer Affected by VCID-r471-g9xs-sbga https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23048.json 38.0.0
2026-04-01T13:38:35.119741+00:00 RedHat Importer Affected by VCID-zxet-n94k-57ge https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49630.json 38.0.0
2026-04-01T13:38:34.838489+00:00 RedHat Importer Affected by VCID-9tez-97xg-z3bs https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49812.json 38.0.0