Sec Feed Reader
  • Alle Eintraege
  • CVEs
  • Dashboards
    Alle Dashboards Ueberblick ISO/IEC 27001:2022 — Referenz-Sicherheitslage
  • Filter
    Erweiterte Filter Nur Critical News Server-Operations Desktop-Software
  • Quellen
    Alle Quellen Apache ASF Apache HTTP Server Security (httpd.org JSON) BSI CSW BleepingComputer CERT-Bund (BSI) CERT-EU – Threat Intelligence CERT/CC Vulnerability Notes CISA Advisories CISA ICS Advisories CISA – Known Exploited Vulnerabilities (KEV) Debian PTS — linux (Quellpaket) Debian Security Debian Security Tracker — linux (CVEs) Full Disclosure Golem Security Google Project Zero Hacker News Sec Heise Security Moodle Security Announcements Moodle — GitHub Releases NCSC UK – News Nginx Security OWASP ModSecurity Releases OpenKRITIS PHP Security (php/php-src GHSA) PostgreSQL Project Black — Research Blog SANS Internet Storm Center Security-Insider Tarnkappe.info The Hacker News Zero Day Initiative (Published) netzpolitik.org
  • Bookmarks
  • Suche

CVE-2023-38709

Kenndaten

  • CVE.org (extern): Record bei CVE.org oeffnen
  • CVSS: 7.3
  • EPSS (FIRST): Score —, Perzentil —
  • EPSS-Stand: —
  • Veroeffentlicht (CVE.org): 2024-04-04
  • Zuletzt angereichert: 2026-05-15 01:31 UTC
  • Externe Referenzen (Anzahl): 0
  • Anreicherungs-Plugins (Referenzen): —

Eintraege mit Bezug zu CVE-2023-38709

2025-07-10 00:00

apache_httpd_sec

CVE-2024-42516: HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue.

HIGH vendor_advisory
2024-04-04 00:00

apache_httpd_sec

CVE-2023-38709: Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.

HIGH vendor_advisory
Alle CVEs

Aggregator · SQLPage + PostgreSQL