Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/apache2@2.4.66-1~deb12u1
Typedeb
Namespacedebian
Nameapache2
Version2.4.66-1~deb12u1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2d8p-bbc1-hkfa
vulnerability_id VCID-2d8p-bbc1-hkfa
summary
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58098.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58098
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07443
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07398
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08736
published_at 2026-04-13T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08771
published_at 2026-04-09T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08772
published_at 2026-04-11T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.0875
published_at 2026-04-12T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08669
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08745
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419365
reference_id 2419365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419365
6
reference_url https://httpd.apache.org/security/json/CVE-2025-58098.json
reference_id CVE-2025-58098
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-58098.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:0009
reference_id RHSA-2026:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0009
11
reference_url https://access.redhat.com/errata/RHSA-2026:0010
reference_id RHSA-2026:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0010
12
reference_url https://access.redhat.com/errata/RHSA-2026:0011
reference_id RHSA-2026:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0011
13
reference_url https://access.redhat.com/errata/RHSA-2026:0012
reference_id RHSA-2026:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0012
14
reference_url https://access.redhat.com/errata/RHSA-2026:0074
reference_id RHSA-2026:0074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0074
15
reference_url https://access.redhat.com/errata/RHSA-2026:0075
reference_id RHSA-2026:0075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0075
16
reference_url https://access.redhat.com/errata/RHSA-2026:0090
reference_id RHSA-2026:0090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0090
17
reference_url https://access.redhat.com/errata/RHSA-2026:0095
reference_id RHSA-2026:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0095
18
reference_url https://access.redhat.com/errata/RHSA-2026:0139
reference_id RHSA-2026:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0139
19
reference_url https://access.redhat.com/errata/RHSA-2026:0141
reference_id RHSA-2026:0141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0141
20
reference_url https://access.redhat.com/errata/RHSA-2026:0171
reference_id RHSA-2026:0171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0171
21
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
22
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
23
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-58098
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2d8p-bbc1-hkfa
1
url VCID-3ay7-bwah-2yd1
vulnerability_id VCID-3ay7-bwah-2yd1
summary
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.

This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.

Users are recommended to upgrade to version 2.4.64, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42516.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42516.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-42516
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.5352
published_at 2026-04-02T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53546
published_at 2026-04-04T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.56554
published_at 2026-04-13T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.56587
published_at 2026-04-09T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56597
published_at 2026-04-11T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56573
published_at 2026-04-12T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56532
published_at 2026-04-07T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56583
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-42516
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42516
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374549
reference_id 2374549
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374549
5
reference_url https://httpd.apache.org/security/json/CVE-2024-42516.json
reference_id CVE-2024-42516
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-42516.json
6
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
7
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2024-42516
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ay7-bwah-2yd1
2
url VCID-9tez-97xg-z3bs
vulnerability_id VCID-9tez-97xg-z3bs
summary
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.

Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49812.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49812
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32463
published_at 2026-04-04T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32427
published_at 2026-04-02T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32747
published_at 2026-04-13T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.3281
published_at 2026-04-09T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32811
published_at 2026-04-11T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32773
published_at 2026-04-12T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32735
published_at 2026-04-07T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32783
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374580
reference_id 2374580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374580
5
reference_url https://httpd.apache.org/security/json/CVE-2025-49812.json
reference_id CVE-2025-49812
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-49812.json
6
reference_url https://access.redhat.com/errata/RHSA-2025:13680
reference_id RHSA-2025:13680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13680
7
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
8
reference_url https://access.redhat.com/errata/RHSA-2025:14901
reference_id RHSA-2025:14901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14901
9
reference_url https://access.redhat.com/errata/RHSA-2025:14902
reference_id RHSA-2025:14902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14902
10
reference_url https://access.redhat.com/errata/RHSA-2025:14903
reference_id RHSA-2025:14903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14903
11
reference_url https://access.redhat.com/errata/RHSA-2025:14997
reference_id RHSA-2025:14997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14997
12
reference_url https://access.redhat.com/errata/RHSA-2025:14998
reference_id RHSA-2025:14998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14998
13
reference_url https://access.redhat.com/errata/RHSA-2025:15023
reference_id RHSA-2025:15023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15023
14
reference_url https://access.redhat.com/errata/RHSA-2025:15036
reference_id RHSA-2025:15036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15036
15
reference_url https://access.redhat.com/errata/RHSA-2025:15095
reference_id RHSA-2025:15095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15095
16
reference_url https://access.redhat.com/errata/RHSA-2025:15123
reference_id RHSA-2025:15123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15123
17
reference_url https://access.redhat.com/errata/RHSA-2025:15516
reference_id RHSA-2025:15516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15516
18
reference_url https://access.redhat.com/errata/RHSA-2025:15619
reference_id RHSA-2025:15619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15619
19
reference_url https://access.redhat.com/errata/RHSA-2025:15684
reference_id RHSA-2025:15684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15684
20
reference_url https://access.redhat.com/errata/RHSA-2025:15698
reference_id RHSA-2025:15698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15698
21
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
22
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-49812
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tez-97xg-z3bs
3
url VCID-b9ks-detx-nkdw
vulnerability_id VCID-b9ks-detx-nkdw
summary
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via 
mod_rewrite or apache expressions that pass unvalidated request input.

This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.

Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. 

The server offers limited protection against administrators directing the server to open UNC paths.
Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43394.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-43394
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.1559
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15658
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.1603
published_at 2026-04-13T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.1616
published_at 2026-04-09T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16137
published_at 2026-04-11T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16098
published_at 2026-04-12T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.1601
published_at 2026-04-07T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16096
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-43394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43394
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379332
reference_id 2379332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379332
5
reference_url https://httpd.apache.org/security/json/CVE-2024-43394.json
reference_id CVE-2024-43394
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-43394.json
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2024-43394
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9ks-detx-nkdw
4
url VCID-fsh3-7b9j-dfgf
vulnerability_id VCID-fsh3-7b9j-dfgf
summary
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-65082.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-65082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-65082
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36463
published_at 2026-04-04T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.3643
published_at 2026-04-02T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37416
published_at 2026-04-13T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37463
published_at 2026-04-09T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37477
published_at 2026-04-11T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37443
published_at 2026-04-12T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37399
published_at 2026-04-07T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37451
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-65082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419139
reference_id 2419139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419139
6
reference_url https://httpd.apache.org/security/json/CVE-2025-65082.json
reference_id CVE-2025-65082
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-65082.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
11
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
12
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-65082
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fsh3-7b9j-dfgf
5
url VCID-ha7f-21gy-3qa2
vulnerability_id VCID-ha7f-21gy-3qa2
summary
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server.

This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63.

Users are recommended to upgrade to version 2.4.64, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53020.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53020
reference_id
reference_type
scores
0
value 0.00918
scoring_system epss
scoring_elements 0.75875
published_at 2026-04-02T12:55:00Z
1
value 0.00918
scoring_system epss
scoring_elements 0.75907
published_at 2026-04-04T12:55:00Z
2
value 0.01211
scoring_system epss
scoring_elements 0.78995
published_at 2026-04-13T12:55:00Z
3
value 0.01211
scoring_system epss
scoring_elements 0.78997
published_at 2026-04-09T12:55:00Z
4
value 0.01211
scoring_system epss
scoring_elements 0.79021
published_at 2026-04-11T12:55:00Z
5
value 0.01211
scoring_system epss
scoring_elements 0.79006
published_at 2026-04-12T12:55:00Z
6
value 0.01211
scoring_system epss
scoring_elements 0.78966
published_at 2026-04-07T12:55:00Z
7
value 0.01211
scoring_system epss
scoring_elements 0.7899
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53020
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379343
reference_id 2379343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379343
5
reference_url https://httpd.apache.org/security/json/CVE-2025-53020.json
reference_id CVE-2025-53020
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-53020.json
6
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
7
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-53020
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ha7f-21gy-3qa2
6
url VCID-r471-g9xs-sbga
vulnerability_id VCID-r471-g9xs-sbga
summary
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23048.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-23048
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09386
published_at 2026-04-13T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09416
published_at 2026-04-09T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0943
published_at 2026-04-11T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.094
published_at 2026-04-12T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09071
published_at 2026-04-02T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09124
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09292
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09368
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-23048
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23048
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374576
reference_id 2374576
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374576
5
reference_url https://httpd.apache.org/security/json/CVE-2025-23048.json
reference_id CVE-2025-23048
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-23048.json
6
reference_url https://access.redhat.com/errata/RHSA-2025:13680
reference_id RHSA-2025:13680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13680
7
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
8
reference_url https://access.redhat.com/errata/RHSA-2025:14901
reference_id RHSA-2025:14901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14901
9
reference_url https://access.redhat.com/errata/RHSA-2025:14902
reference_id RHSA-2025:14902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14902
10
reference_url https://access.redhat.com/errata/RHSA-2025:14903
reference_id RHSA-2025:14903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14903
11
reference_url https://access.redhat.com/errata/RHSA-2025:15023
reference_id RHSA-2025:15023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15023
12
reference_url https://access.redhat.com/errata/RHSA-2025:15095
reference_id RHSA-2025:15095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15095
13
reference_url https://access.redhat.com/errata/RHSA-2025:15123
reference_id RHSA-2025:15123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15123
14
reference_url https://access.redhat.com/errata/RHSA-2025:15516
reference_id RHSA-2025:15516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15516
15
reference_url https://access.redhat.com/errata/RHSA-2025:15619
reference_id RHSA-2025:15619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15619
16
reference_url https://access.redhat.com/errata/RHSA-2025:15684
reference_id RHSA-2025:15684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15684
17
reference_url https://access.redhat.com/errata/RHSA-2025:15698
reference_id RHSA-2025:15698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15698
18
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
19
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-23048
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r471-g9xs-sbga
7
url VCID-td8g-tmny-jyaa
vulnerability_id VCID-td8g-tmny-jyaa
summary
An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.

This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.


Users are recommended to upgrade to version 2.4.66, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55753.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55753
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.22106
published_at 2026-04-02T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-04T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28298
published_at 2026-04-13T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28396
published_at 2026-04-09T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28399
published_at 2026-04-11T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28356
published_at 2026-04-12T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28287
published_at 2026-04-07T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28352
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419140
reference_id 2419140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419140
6
reference_url https://httpd.apache.org/security/json/CVE-2025-55753.json
reference_id CVE-2025-55753
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-55753.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23738
reference_id RHSA-2025:23738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23738
9
reference_url https://access.redhat.com/errata/RHSA-2025:23739
reference_id RHSA-2025:23739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23739
10
reference_url https://access.redhat.com/errata/RHSA-2026:0009
reference_id RHSA-2026:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0009
11
reference_url https://access.redhat.com/errata/RHSA-2026:0010
reference_id RHSA-2026:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0010
12
reference_url https://access.redhat.com/errata/RHSA-2026:0011
reference_id RHSA-2026:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0011
13
reference_url https://access.redhat.com/errata/RHSA-2026:0012
reference_id RHSA-2026:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0012
14
reference_url https://access.redhat.com/errata/RHSA-2026:0029
reference_id RHSA-2026:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0029
15
reference_url https://access.redhat.com/errata/RHSA-2026:0030
reference_id RHSA-2026:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0030
16
reference_url https://access.redhat.com/errata/RHSA-2026:0092
reference_id RHSA-2026:0092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0092
17
reference_url https://access.redhat.com/errata/RHSA-2026:0093
reference_id RHSA-2026:0093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0093
18
reference_url https://access.redhat.com/errata/RHSA-2026:0094
reference_id RHSA-2026:0094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0094
19
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
20
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
21
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-55753
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-td8g-tmny-jyaa
8
url VCID-varh-ysfr-euc8
vulnerability_id VCID-varh-ysfr-euc8
summary
mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66200.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66200.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-66200
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17472
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17519
published_at 2026-04-04T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21507
published_at 2026-04-13T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21591
published_at 2026-04-09T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21602
published_at 2026-04-11T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21564
published_at 2026-04-12T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21456
published_at 2026-04-07T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21532
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-66200
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419262
reference_id 2419262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419262
6
reference_url https://httpd.apache.org/security/json/CVE-2025-66200.json
reference_id CVE-2025-66200
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-66200.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
11
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
12
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-66200
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-varh-ysfr-euc8
9
url VCID-ww49-y35r-ykdd
vulnerability_id VCID-ww49-y35r-ykdd
summary
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.

Users are recommended to upgrade to version 2.4.64 which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43204.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-43204
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45583
published_at 2026-04-02T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45605
published_at 2026-04-04T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46255
published_at 2026-04-13T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.4625
published_at 2026-04-09T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46273
published_at 2026-04-11T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46245
published_at 2026-04-12T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46192
published_at 2026-04-07T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46248
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-43204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374553
reference_id 2374553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374553
5
reference_url https://httpd.apache.org/security/json/CVE-2024-43204.json
reference_id CVE-2024-43204
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-43204.json
6
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
7
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2024-43204
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ww49-y35r-ykdd
10
url VCID-zxet-n94k-57ge
vulnerability_id VCID-zxet-n94k-57ge
summary
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.

Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49630.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49630
reference_id
reference_type
scores
0
value 0.01043
scoring_system epss
scoring_elements 0.77462
published_at 2026-04-13T12:55:00Z
1
value 0.01043
scoring_system epss
scoring_elements 0.77459
published_at 2026-04-09T12:55:00Z
2
value 0.01043
scoring_system epss
scoring_elements 0.77485
published_at 2026-04-11T12:55:00Z
3
value 0.01043
scoring_system epss
scoring_elements 0.77465
published_at 2026-04-12T12:55:00Z
4
value 0.01043
scoring_system epss
scoring_elements 0.77413
published_at 2026-04-02T12:55:00Z
5
value 0.01043
scoring_system epss
scoring_elements 0.77439
published_at 2026-04-04T12:55:00Z
6
value 0.01043
scoring_system epss
scoring_elements 0.77419
published_at 2026-04-07T12:55:00Z
7
value 0.01043
scoring_system epss
scoring_elements 0.7745
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49630
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49630
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374578
reference_id 2374578
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374578
5
reference_url https://httpd.apache.org/security/json/CVE-2025-49630.json
reference_id CVE-2025-49630
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-49630.json
6
reference_url https://access.redhat.com/errata/RHSA-2025:13680
reference_id RHSA-2025:13680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13680
7
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
8
reference_url https://access.redhat.com/errata/RHSA-2025:14625
reference_id RHSA-2025:14625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14625
9
reference_url https://access.redhat.com/errata/RHSA-2025:14983
reference_id RHSA-2025:14983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14983
10
reference_url https://access.redhat.com/errata/RHSA-2025:15123
reference_id RHSA-2025:15123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15123
11
reference_url https://access.redhat.com/errata/RHSA-2025:15516
reference_id RHSA-2025:15516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15516
12
reference_url https://access.redhat.com/errata/RHSA-2025:15619
reference_id RHSA-2025:15619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15619
13
reference_url https://access.redhat.com/errata/RHSA-2025:15684
reference_id RHSA-2025:15684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15684
14
reference_url https://access.redhat.com/errata/RHSA-2025:15698
reference_id RHSA-2025:15698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15698
15
reference_url https://access.redhat.com/errata/RHSA-2025:15725
reference_id RHSA-2025:15725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15725
16
reference_url https://access.redhat.com/errata/RHSA-2025:15726
reference_id RHSA-2025:15726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15726
17
reference_url https://access.redhat.com/errata/RHSA-2025:15727
reference_id RHSA-2025:15727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15727
18
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
19
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-49630
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxet-n94k-57ge
11
url VCID-zyyh-n42k-8bhr
vulnerability_id VCID-zyyh-n42k-8bhr
summary
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.

In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47252.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47252
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37345
published_at 2026-04-02T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37371
published_at 2026-04-04T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39845
published_at 2026-04-13T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39886
published_at 2026-04-09T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39895
published_at 2026-04-11T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39861
published_at 2026-04-12T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39817
published_at 2026-04-07T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39872
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47252
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374571
reference_id 2374571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374571
5
reference_url https://httpd.apache.org/security/json/CVE-2024-47252.json
reference_id CVE-2024-47252
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-47252.json
6
reference_url https://access.redhat.com/errata/RHSA-2025:13680
reference_id RHSA-2025:13680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13680
7
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
8
reference_url https://access.redhat.com/errata/RHSA-2025:14901
reference_id RHSA-2025:14901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14901
9
reference_url https://access.redhat.com/errata/RHSA-2025:14902
reference_id RHSA-2025:14902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14902
10
reference_url https://access.redhat.com/errata/RHSA-2025:14903
reference_id RHSA-2025:14903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14903
11
reference_url https://access.redhat.com/errata/RHSA-2025:14997
reference_id RHSA-2025:14997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14997
12
reference_url https://access.redhat.com/errata/RHSA-2025:15023
reference_id RHSA-2025:15023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15023
13
reference_url https://access.redhat.com/errata/RHSA-2025:15095
reference_id RHSA-2025:15095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15095
14
reference_url https://access.redhat.com/errata/RHSA-2025:15123
reference_id RHSA-2025:15123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15123
15
reference_url https://access.redhat.com/errata/RHSA-2025:15516
reference_id RHSA-2025:15516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15516
16
reference_url https://access.redhat.com/errata/RHSA-2025:15619
reference_id RHSA-2025:15619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15619
17
reference_url https://access.redhat.com/errata/RHSA-2025:15684
reference_id RHSA-2025:15684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15684
18
reference_url https://access.redhat.com/errata/RHSA-2025:15698
reference_id RHSA-2025:15698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15698
19
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
20
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2024-47252
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zyyh-n42k-8bhr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1