Metrics
Affected Vendors & Products
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Tue, 29 Jul 2025 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Tue, 15 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        cvssV3_1
         
  | 
    
        
        ssvc
         
 
  | 
Mon, 14 Jul 2025 12:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        cvssV3_1
         
 
  | 
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        epss
         
  | 
Thu, 10 Jul 2025 17:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue. | |
| Title | Apache HTTP Server: SSRF with mod_headers setting Content-Type header | |
| Weaknesses | CWE-918 | |
| References | 
         | 
Status: PUBLISHED
Assigner: apache
Published: 2025-07-10T16:54:15.759Z
Updated: 2025-11-03T19:30:37.649Z
Reserved: 2024-08-08T15:13:29.047Z
Link: CVE-2024-43204
Updated: 2025-07-11T16:07:00.518Z
Status : Modified
Published: 2025-07-10T17:15:45.987
Modified: 2025-11-03T20:16:28.683
Link: CVE-2024-43204
ReportizFlow