{"vulnerability": "CVE-2023-27522", "sightings": [{"uuid": "edc804ce-a6eb-4dbf-be24-25c7f90e7b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27522", "type": "seen", "source": "https://t.me/cibsecurity/59570", "content": "\u203c CVE-2023-27522 \u203c\n\nHTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T18:13:38.000000Z"}, {"uuid": "01a0b0f9-3f07-4e6f-938e-e10b4994686b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27522", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-02", "content": "", "creation_timestamp": "2026-01-27T11:00:00.000000Z"}, {"uuid": "4c8b7c57-d7bd-4aa8-9d0c-8f58fc494224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27522", "type": "seen", "source": "Telegram/Hf_SunJuoYNf_bsQCJ20cuXyI7bzH8EMEXzusn30k3vpXeQ", "content": "", "creation_timestamp": "2024-10-15T10:14:15.000000Z"}, {"uuid": "5a067124-1681-4b95-baf0-bc65f78b7272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27522", "type": "seen", "source": "https://t.me/arpsyndicate/150", "content": "#ExploitObserverAlert\n\nCVE-2023-27522\n\nDESCRIPTION: Exploit Observer has 14 entries related to CVE-2023-27522. HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.\n\nSpecial characters in the origin response header can truncate/split the response forwarded to the client.\n\nFIRST-EPSS: 0.005500000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-13T02:44:55.000000Z"}, {"uuid": "0d6e9db4-b624-45de-8ea3-546892bf7ec2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27522", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-133-01", "content": "", "creation_timestamp": "2025-05-13T10:00:00.000000Z"}, {"uuid": "8da08112-9f02-4e1a-ac2f-669572e79fa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27522", "type": "seen", "source": "https://t.me/ctinow/100957", "content": "Internet Bug Bounty: Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting (CVE-2023-27522)\n\nhttps://ift.tt/0yGU7uk", "creation_timestamp": "2023-03-23T07:51:17.000000Z"}, {"uuid": "5b3421fb-8dac-40b2-81b7-e978c9e0a348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-27522", "type": "seen", "source": "Telegram/zyh2j7QPoGimdfNrucDW8nGVJvwQaa6_ybAaByh8mMfpDfE", "content": "", "creation_timestamp": "2023-03-08T16:18:04.000000Z"}]}