Lookup for vulnerable packages by Package URL.

Purlpkg:apache/httpd@1.3.4
Typeapache
Namespace
Namehttpd
Version1.3.4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.0.65
Latest_non_vulnerable_version2.4.54
Affected_by_vulnerabilities
0
url VCID-123w-f3zc-37d9
vulnerability_id VCID-123w-f3zc-37d9
summary An incorrect conversion between numeric types flaw was found in the mod_proxy module which affects some 64-bit architecture systems. A malicious HTTP server to which requests are being proxied could use this flaw to trigger a heap buffer overflow in an httpd child process via a carefully crafted response.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0010
reference_id
reference_type
scores
0
value 0.47445
scoring_system epss
scoring_elements 0.97698
published_at 2026-04-13T12:55:00Z
1
value 0.47445
scoring_system epss
scoring_elements 0.97677
published_at 2026-04-01T12:55:00Z
2
value 0.47445
scoring_system epss
scoring_elements 0.97683
published_at 2026-04-02T12:55:00Z
3
value 0.47445
scoring_system epss
scoring_elements 0.97684
published_at 2026-04-04T12:55:00Z
4
value 0.47445
scoring_system epss
scoring_elements 0.97685
published_at 2026-04-07T12:55:00Z
5
value 0.47445
scoring_system epss
scoring_elements 0.97689
published_at 2026-04-08T12:55:00Z
6
value 0.47445
scoring_system epss
scoring_elements 0.97692
published_at 2026-04-09T12:55:00Z
7
value 0.47445
scoring_system epss
scoring_elements 0.97695
published_at 2026-04-11T12:55:00Z
8
value 0.47445
scoring_system epss
scoring_elements 0.97697
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0010
1
reference_url https://httpd.apache.org/security/json/CVE-2010-0010.json
reference_id CVE-2010-0010
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2010-0010.json
fixed_packages
0
url pkg:apache/httpd@1.3.42
purl pkg:apache/httpd@1.3.42
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.42
aliases CVE-2010-0010
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-123w-f3zc-37d9
1
url VCID-3m9y-maes-5ycp
vulnerability_id VCID-3m9y-maes-5ycp
summary Apache does not filter terminal escape sequences from error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0020.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0020
reference_id
reference_type
scores
0
value 0.20267
scoring_system epss
scoring_elements 0.95513
published_at 2026-04-13T12:55:00Z
1
value 0.20267
scoring_system epss
scoring_elements 0.95476
published_at 2026-04-01T12:55:00Z
2
value 0.20267
scoring_system epss
scoring_elements 0.95486
published_at 2026-04-02T12:55:00Z
3
value 0.20267
scoring_system epss
scoring_elements 0.95492
published_at 2026-04-04T12:55:00Z
4
value 0.20267
scoring_system epss
scoring_elements 0.95497
published_at 2026-04-07T12:55:00Z
5
value 0.20267
scoring_system epss
scoring_elements 0.95503
published_at 2026-04-08T12:55:00Z
6
value 0.20267
scoring_system epss
scoring_elements 0.95506
published_at 2026-04-09T12:55:00Z
7
value 0.20267
scoring_system epss
scoring_elements 0.9551
published_at 2026-04-11T12:55:00Z
8
value 0.20267
scoring_system epss
scoring_elements 0.95512
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0020
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616937
reference_id 1616937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616937
4
reference_url https://httpd.apache.org/security/json/CVE-2003-0020.json
reference_id CVE-2003-0020
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2003-0020.json
5
reference_url https://access.redhat.com/errata/RHSA-2003:082
reference_id RHSA-2003:082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:082
6
reference_url https://access.redhat.com/errata/RHSA-2003:083
reference_id RHSA-2003:083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:083
7
reference_url https://access.redhat.com/errata/RHSA-2003:104
reference_id RHSA-2003:104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:104
8
reference_url https://access.redhat.com/errata/RHSA-2003:139
reference_id RHSA-2003:139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:139
9
reference_url https://access.redhat.com/errata/RHSA-2003:243
reference_id RHSA-2003:243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:243
10
reference_url https://access.redhat.com/errata/RHSA-2003:244
reference_id RHSA-2003:244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:244
fixed_packages
0
url pkg:apache/httpd@1.3.31
purl pkg:apache/httpd@1.3.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
9
vulnerability VCID-x89d-7t1q-skcx
10
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.31
1
url pkg:apache/httpd@2.0.49
purl pkg:apache/httpd@2.0.49
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-1nh6-77uc-xbak
2
vulnerability VCID-3cea-3rkm-r7gs
3
vulnerability VCID-3wbg-bxvj-1kca
4
vulnerability VCID-4zzy-q5zp-jkgm
5
vulnerability VCID-56kt-8bg6-zbcj
6
vulnerability VCID-5yez-d5nj-q7eq
7
vulnerability VCID-6d43-sjqw-tbbp
8
vulnerability VCID-76s2-26cr-syd1
9
vulnerability VCID-7krj-8vat-3ydy
10
vulnerability VCID-95zk-suqh-j7e7
11
vulnerability VCID-agrr-tcwf-afe7
12
vulnerability VCID-bfvg-u6sz-6qc6
13
vulnerability VCID-d4rc-pnv5-6uc8
14
vulnerability VCID-d66x-55ub-vkfw
15
vulnerability VCID-dqkp-f1my-dbg9
16
vulnerability VCID-en6m-ye18-97hk
17
vulnerability VCID-f8n9-ampd-yyah
18
vulnerability VCID-fn5k-e2jr-6ube
19
vulnerability VCID-fq9j-uewn-q7h7
20
vulnerability VCID-g1jc-8vza-u3ad
21
vulnerability VCID-g2pp-aahn-mfcd
22
vulnerability VCID-j3mb-97k1-uuh9
23
vulnerability VCID-kcwg-hswv-2uf7
24
vulnerability VCID-kgpj-aexq-7kah
25
vulnerability VCID-kkfv-4jd1-bqdm
26
vulnerability VCID-m8uk-byje-dqey
27
vulnerability VCID-pdj3-4txb-vych
28
vulnerability VCID-prd8-51a5-pygj
29
vulnerability VCID-pufp-t6dh-xqhv
30
vulnerability VCID-qf2e-kgxk-pkhc
31
vulnerability VCID-qtav-hqnd-b7fa
32
vulnerability VCID-qufv-kta7-1feu
33
vulnerability VCID-rhhj-jhej-gfcj
34
vulnerability VCID-srxw-jjvr-p3d5
35
vulnerability VCID-ss79-kcpu-mqd5
36
vulnerability VCID-umuk-3n1q-3qet
37
vulnerability VCID-v2g6-h93b-euer
38
vulnerability VCID-vqs2-5x99-7qfd
39
vulnerability VCID-wycq-jwzz-q7hf
40
vulnerability VCID-y56e-kuj4-97f6
41
vulnerability VCID-y8nd-7h3r-7fh5
42
vulnerability VCID-ym93-sxb8-fkdm
43
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.49
aliases CVE-2003-0020
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3m9y-maes-5ycp
2
url VCID-a86d-f4nd-eqhh
vulnerability_id VCID-a86d-f4nd-eqhh
summary Apache did not filter terminal escape sequences from its access logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0083.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0083.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0083
reference_id
reference_type
scores
0
value 0.12356
scoring_system epss
scoring_elements 0.9388
published_at 2026-04-13T12:55:00Z
1
value 0.12356
scoring_system epss
scoring_elements 0.93842
published_at 2026-04-01T12:55:00Z
2
value 0.12356
scoring_system epss
scoring_elements 0.93851
published_at 2026-04-02T12:55:00Z
3
value 0.12356
scoring_system epss
scoring_elements 0.9386
published_at 2026-04-04T12:55:00Z
4
value 0.12356
scoring_system epss
scoring_elements 0.93863
published_at 2026-04-07T12:55:00Z
5
value 0.12356
scoring_system epss
scoring_elements 0.93871
published_at 2026-04-08T12:55:00Z
6
value 0.12356
scoring_system epss
scoring_elements 0.93875
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0083
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0083
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616961
reference_id 1616961
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616961
4
reference_url https://httpd.apache.org/security/json/CVE-2003-0083.json
reference_id CVE-2003-0083
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2003-0083.json
5
reference_url https://access.redhat.com/errata/RHSA-2003:083
reference_id RHSA-2003:083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:083
6
reference_url https://access.redhat.com/errata/RHSA-2003:104
reference_id RHSA-2003:104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:104
7
reference_url https://access.redhat.com/errata/RHSA-2003:116
reference_id RHSA-2003:116
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:116
8
reference_url https://access.redhat.com/errata/RHSA-2003:139
reference_id RHSA-2003:139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:139
fixed_packages
0
url pkg:apache/httpd@1.3.26
purl pkg:apache/httpd@1.3.26
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-bu8e-hpcy-jqda
3
vulnerability VCID-dqkp-f1my-dbg9
4
vulnerability VCID-e2sp-bna5-mqb6
5
vulnerability VCID-j3mb-97k1-uuh9
6
vulnerability VCID-kcwg-hswv-2uf7
7
vulnerability VCID-kgpj-aexq-7kah
8
vulnerability VCID-me4r-1qb6-dqdf
9
vulnerability VCID-nkgw-gs9g-ckft
10
vulnerability VCID-prd8-51a5-pygj
11
vulnerability VCID-sn3y-mpbk-hqe8
12
vulnerability VCID-srxw-jjvr-p3d5
13
vulnerability VCID-ug4a-zxkg-cbew
14
vulnerability VCID-x89d-7t1q-skcx
15
vulnerability VCID-yjqs-kszf-yka1
16
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.26
1
url pkg:apache/httpd@2.0.46
purl pkg:apache/httpd@2.0.46
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-112d-h2a5-xbc4
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1nh6-77uc-xbak
3
vulnerability VCID-1v86-mmdn-z3fk
4
vulnerability VCID-3cea-3rkm-r7gs
5
vulnerability VCID-3m9y-maes-5ycp
6
vulnerability VCID-3wbg-bxvj-1kca
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5yez-d5nj-q7eq
10
vulnerability VCID-6d43-sjqw-tbbp
11
vulnerability VCID-76s2-26cr-syd1
12
vulnerability VCID-7krj-8vat-3ydy
13
vulnerability VCID-95zk-suqh-j7e7
14
vulnerability VCID-9b9s-sz9t-rubp
15
vulnerability VCID-9xk2-as1c-7kd2
16
vulnerability VCID-bfvg-u6sz-6qc6
17
vulnerability VCID-d4rc-pnv5-6uc8
18
vulnerability VCID-d66x-55ub-vkfw
19
vulnerability VCID-dqkp-f1my-dbg9
20
vulnerability VCID-en6m-ye18-97hk
21
vulnerability VCID-f8n9-ampd-yyah
22
vulnerability VCID-fn5k-e2jr-6ube
23
vulnerability VCID-fq9j-uewn-q7h7
24
vulnerability VCID-g1jc-8vza-u3ad
25
vulnerability VCID-g2pp-aahn-mfcd
26
vulnerability VCID-j3mb-97k1-uuh9
27
vulnerability VCID-kcwg-hswv-2uf7
28
vulnerability VCID-kgpj-aexq-7kah
29
vulnerability VCID-kkfv-4jd1-bqdm
30
vulnerability VCID-m8uk-byje-dqey
31
vulnerability VCID-pdj3-4txb-vych
32
vulnerability VCID-prd8-51a5-pygj
33
vulnerability VCID-pufp-t6dh-xqhv
34
vulnerability VCID-qf2e-kgxk-pkhc
35
vulnerability VCID-qtav-hqnd-b7fa
36
vulnerability VCID-qufv-kta7-1feu
37
vulnerability VCID-rhhj-jhej-gfcj
38
vulnerability VCID-srxw-jjvr-p3d5
39
vulnerability VCID-ss79-kcpu-mqd5
40
vulnerability VCID-umuk-3n1q-3qet
41
vulnerability VCID-v2g6-h93b-euer
42
vulnerability VCID-vqs2-5x99-7qfd
43
vulnerability VCID-vud7-n4uk-2be8
44
vulnerability VCID-wycq-jwzz-q7hf
45
vulnerability VCID-y56e-kuj4-97f6
46
vulnerability VCID-y8nd-7h3r-7fh5
47
vulnerability VCID-yjqs-kszf-yka1
48
vulnerability VCID-ym93-sxb8-fkdm
49
vulnerability VCID-za9f-j42y-ukdp
50
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.46
aliases CVE-2003-0083
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a86d-f4nd-eqhh
3
url VCID-bu8e-hpcy-jqda
vulnerability_id VCID-bu8e-hpcy-jqda
summary The permissions of the shared memory used for the scoreboard allows an attacker who can execute under the Apache UID to send a signal to any process as root or cause a local denial of service attack.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0839.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0839
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.34258
published_at 2026-04-13T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.34016
published_at 2026-04-01T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34354
published_at 2026-04-02T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34381
published_at 2026-04-04T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34248
published_at 2026-04-07T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.34291
published_at 2026-04-08T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.34321
published_at 2026-04-09T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34322
published_at 2026-04-11T12:55:00Z
8
value 0.00141
scoring_system epss
scoring_elements 0.34281
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0839
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616822
reference_id 1616822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616822
3
reference_url https://httpd.apache.org/security/json/CVE-2002-0839.json
reference_id CVE-2002-0839
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2002-0839.json
4
reference_url https://access.redhat.com/errata/RHSA-2002:222
reference_id RHSA-2002:222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:222
5
reference_url https://access.redhat.com/errata/RHSA-2002:243
reference_id RHSA-2002:243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:243
6
reference_url https://access.redhat.com/errata/RHSA-2002:244
reference_id RHSA-2002:244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:244
7
reference_url https://access.redhat.com/errata/RHSA-2002:248
reference_id RHSA-2002:248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:248
8
reference_url https://access.redhat.com/errata/RHSA-2002:251
reference_id RHSA-2002:251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:251
9
reference_url https://access.redhat.com/errata/RHSA-2003:106
reference_id RHSA-2003:106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:106
fixed_packages
0
url pkg:apache/httpd@1.3.27
purl pkg:apache/httpd@1.3.27
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-6kzq-pwjb-bug6
3
vulnerability VCID-dqkp-f1my-dbg9
4
vulnerability VCID-e2sp-bna5-mqb6
5
vulnerability VCID-j3mb-97k1-uuh9
6
vulnerability VCID-kcwg-hswv-2uf7
7
vulnerability VCID-kgpj-aexq-7kah
8
vulnerability VCID-me4r-1qb6-dqdf
9
vulnerability VCID-prd8-51a5-pygj
10
vulnerability VCID-srxw-jjvr-p3d5
11
vulnerability VCID-ug4a-zxkg-cbew
12
vulnerability VCID-x89d-7t1q-skcx
13
vulnerability VCID-yjqs-kszf-yka1
14
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.27
aliases CVE-2002-0839
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bu8e-hpcy-jqda
4
url VCID-d5w4-vnbd-afdj
vulnerability_id VCID-d5w4-vnbd-afdj
summary Malicious requests can cause various effects ranging from a relatively harmless increase in system resources through to denial of service attacks and in some cases the ability to execute arbitrary remote code.
references
0
reference_url ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-029.0.txt
reference_id
reference_type
scores
url ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-029.0.txt
1
reference_url ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.32
reference_id
reference_type
scores
url ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.32
2
reference_url ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.31
reference_id
reference_type
scores
url ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.31
3
reference_url ftp://patches.sgi.com/support/free/security/advisories/20020605-01-A
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20020605-01-A
4
reference_url ftp://patches.sgi.com/support/free/security/advisories/20020605-01-I
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20020605-01-I
5
reference_url http://archives.neohapsis.com/archives/bugtraq/2002-06/0235.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2002-06/0235.html
6
reference_url http://archives.neohapsis.com/archives/bugtraq/2002-06/0266.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2002-06/0266.html
7
reference_url http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000498
reference_id
reference_type
scores
url http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000498
8
reference_url http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:039
reference_id
reference_type
scores
url http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:039
9
reference_url http://httpd.apache.org/info/security_bulletin_20020617.txt
reference_id
reference_type
scores
url http://httpd.apache.org/info/security_bulletin_20020617.txt
10
reference_url http://online.securityfocus.com/advisories/4240
reference_id
reference_type
scores
url http://online.securityfocus.com/advisories/4240
11
reference_url http://online.securityfocus.com/advisories/4257
reference_id
reference_type
scores
url http://online.securityfocus.com/advisories/4257
12
reference_url http://online.securityfocus.com/archive/1/278149
reference_id
reference_type
scores
url http://online.securityfocus.com/archive/1/278149
13
reference_url http://rhn.redhat.com/errata/RHSA-2002-103.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2002-103.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2002-117.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2002-117.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2002-118.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2002-118.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0392.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0392.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0392
reference_id
reference_type
scores
0
value 0.53887
scoring_system epss
scoring_elements 0.98007
published_at 2026-04-13T12:55:00Z
1
value 0.53887
scoring_system epss
scoring_elements 0.98001
published_at 2026-04-09T12:55:00Z
2
value 0.53887
scoring_system epss
scoring_elements 0.98005
published_at 2026-04-11T12:55:00Z
3
value 0.53887
scoring_system epss
scoring_elements 0.98006
published_at 2026-04-12T12:55:00Z
4
value 0.53887
scoring_system epss
scoring_elements 0.97986
published_at 2026-04-01T12:55:00Z
5
value 0.53887
scoring_system epss
scoring_elements 0.97991
published_at 2026-04-02T12:55:00Z
6
value 0.53887
scoring_system epss
scoring_elements 0.97993
published_at 2026-04-04T12:55:00Z
7
value 0.53887
scoring_system epss
scoring_elements 0.97995
published_at 2026-04-07T12:55:00Z
8
value 0.53887
scoring_system epss
scoring_elements 0.97999
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0392
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0392
19
reference_url http://secunia.com/advisories/21917
reference_id
reference_type
scores
url http://secunia.com/advisories/21917
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
33
reference_url http://www2.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&docId=200000083816475
reference_id
reference_type
scores
url http://www2.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&docId=200000083816475
34
reference_url http://www.cert.org/advisories/CA-2002-17.html
reference_id
reference_type
scores
url http://www.cert.org/advisories/CA-2002-17.html
35
reference_url http://www.debian.org/security/2002/dsa-131
reference_id
reference_type
scores
url http://www.debian.org/security/2002/dsa-131
36
reference_url http://www.debian.org/security/2002/dsa-132
reference_id
reference_type
scores
url http://www.debian.org/security/2002/dsa-132
37
reference_url http://www.debian.org/security/2002/dsa-133
reference_id
reference_type
scores
url http://www.debian.org/security/2002/dsa-133
38
reference_url http://www.frsirt.com/english/advisories/2006/3598
reference_id
reference_type
scores
url http://www.frsirt.com/english/advisories/2006/3598
39
reference_url http://www.iss.net/security_center/static/9249.php
reference_id
reference_type
scores
url http://www.iss.net/security_center/static/9249.php
40
reference_url http://www.kb.cert.org/vuls/id/944335
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/944335
41
reference_url http://www.linuxsecurity.com/advisories/other_advisory-2137.html
reference_id
reference_type
scores
url http://www.linuxsecurity.com/advisories/other_advisory-2137.html
42
reference_url http://www.novell.com/linux/security/advisories/2002_22_apache.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2002_22_apache.html
43
reference_url http://www.osvdb.org/838
reference_id
reference_type
scores
url http://www.osvdb.org/838
44
reference_url http://www.redhat.com/support/errata/RHSA-2002-126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2002-126.html
45
reference_url http://www.redhat.com/support/errata/RHSA-2002-150.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2002-150.html
46
reference_url http://www.redhat.com/support/errata/RHSA-2003-106.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2003-106.html
47
reference_url http://www.securityfocus.com/bid/20005
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/20005
48
reference_url http://www.securityfocus.com/bid/5033
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/5033
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616772
reference_id 1616772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616772
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
52
reference_url https://httpd.apache.org/security/json/CVE-2002-0392.json
reference_id CVE-2002-0392
reference_type
scores
0
value critical
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2002-0392.json
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2002-0392
reference_id CVE-2002-0392
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2002-0392
54
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21559.c
reference_id CVE-2002-0392;OSVDB-838
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21559.c
55
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21560.c
reference_id CVE-2002-0392;OSVDB-838
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21560.c
56
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/remote/16782.rb
reference_id CVE-2002-0392;OSVDB-838
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/remote/16782.rb
57
reference_url https://www.securityfocus.com/bid/5033/info
reference_id CVE-2002-0392;OSVDB-838
reference_type exploit
scores
url https://www.securityfocus.com/bid/5033/info
58
reference_url https://access.redhat.com/errata/RHSA-2002:103
reference_id RHSA-2002:103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:103
59
reference_url https://access.redhat.com/errata/RHSA-2002:117
reference_id RHSA-2002:117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:117
60
reference_url https://access.redhat.com/errata/RHSA-2002:118
reference_id RHSA-2002:118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:118
61
reference_url https://access.redhat.com/errata/RHSA-2002:126
reference_id RHSA-2002:126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:126
62
reference_url https://access.redhat.com/errata/RHSA-2002:150
reference_id RHSA-2002:150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:150
63
reference_url https://access.redhat.com/errata/RHSA-2003:106
reference_id RHSA-2003:106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:106
fixed_packages
0
url pkg:apache/httpd@1.3.26
purl pkg:apache/httpd@1.3.26
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-bu8e-hpcy-jqda
3
vulnerability VCID-dqkp-f1my-dbg9
4
vulnerability VCID-e2sp-bna5-mqb6
5
vulnerability VCID-j3mb-97k1-uuh9
6
vulnerability VCID-kcwg-hswv-2uf7
7
vulnerability VCID-kgpj-aexq-7kah
8
vulnerability VCID-me4r-1qb6-dqdf
9
vulnerability VCID-nkgw-gs9g-ckft
10
vulnerability VCID-prd8-51a5-pygj
11
vulnerability VCID-sn3y-mpbk-hqe8
12
vulnerability VCID-srxw-jjvr-p3d5
13
vulnerability VCID-ug4a-zxkg-cbew
14
vulnerability VCID-x89d-7t1q-skcx
15
vulnerability VCID-yjqs-kszf-yka1
16
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.26
1
url pkg:apache/httpd@2.0.37
purl pkg:apache/httpd@2.0.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-112d-h2a5-xbc4
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1nh6-77uc-xbak
3
vulnerability VCID-1v86-mmdn-z3fk
4
vulnerability VCID-3cea-3rkm-r7gs
5
vulnerability VCID-3m9y-maes-5ycp
6
vulnerability VCID-3wbg-bxvj-1kca
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5yez-d5nj-q7eq
10
vulnerability VCID-6d43-sjqw-tbbp
11
vulnerability VCID-76s2-26cr-syd1
12
vulnerability VCID-7krj-8vat-3ydy
13
vulnerability VCID-95zk-suqh-j7e7
14
vulnerability VCID-9b9s-sz9t-rubp
15
vulnerability VCID-9xk2-as1c-7kd2
16
vulnerability VCID-a86d-f4nd-eqhh
17
vulnerability VCID-bfvg-u6sz-6qc6
18
vulnerability VCID-cgqk-f3fx-sfe9
19
vulnerability VCID-d4rc-pnv5-6uc8
20
vulnerability VCID-d66x-55ub-vkfw
21
vulnerability VCID-dqkp-f1my-dbg9
22
vulnerability VCID-en6m-ye18-97hk
23
vulnerability VCID-fn5k-e2jr-6ube
24
vulnerability VCID-fq9j-uewn-q7h7
25
vulnerability VCID-g1jc-8vza-u3ad
26
vulnerability VCID-g2pp-aahn-mfcd
27
vulnerability VCID-ggje-ade3-n3hg
28
vulnerability VCID-j3mb-97k1-uuh9
29
vulnerability VCID-kcwg-hswv-2uf7
30
vulnerability VCID-kgpj-aexq-7kah
31
vulnerability VCID-kkfv-4jd1-bqdm
32
vulnerability VCID-m8uk-byje-dqey
33
vulnerability VCID-nkgw-gs9g-ckft
34
vulnerability VCID-pdj3-4txb-vych
35
vulnerability VCID-prd8-51a5-pygj
36
vulnerability VCID-pufp-t6dh-xqhv
37
vulnerability VCID-qtav-hqnd-b7fa
38
vulnerability VCID-qufv-kta7-1feu
39
vulnerability VCID-rhhj-jhej-gfcj
40
vulnerability VCID-srxw-jjvr-p3d5
41
vulnerability VCID-ss79-kcpu-mqd5
42
vulnerability VCID-t3d9-1ebn-bbdx
43
vulnerability VCID-tbdg-kev6-5uep
44
vulnerability VCID-umuk-3n1q-3qet
45
vulnerability VCID-v2g6-h93b-euer
46
vulnerability VCID-vqs2-5x99-7qfd
47
vulnerability VCID-vud7-n4uk-2be8
48
vulnerability VCID-wycq-jwzz-q7hf
49
vulnerability VCID-y56e-kuj4-97f6
50
vulnerability VCID-y8nd-7h3r-7fh5
51
vulnerability VCID-yjqs-kszf-yka1
52
vulnerability VCID-ym93-sxb8-fkdm
53
vulnerability VCID-za9f-j42y-ukdp
54
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.37
aliases CVE-2002-0392
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5w4-vnbd-afdj
5
url VCID-dqkp-f1my-dbg9
vulnerability_id VCID-dqkp-f1my-dbg9
summary A flaw was found in the mod_imagemap module. On sites where mod_imagemap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5000.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5000
reference_id
reference_type
scores
0
value 0.7731
scoring_system epss
scoring_elements 0.98975
published_at 2026-04-07T12:55:00Z
1
value 0.7731
scoring_system epss
scoring_elements 0.98968
published_at 2026-04-01T12:55:00Z
2
value 0.7731
scoring_system epss
scoring_elements 0.9897
published_at 2026-04-02T12:55:00Z
3
value 0.7731
scoring_system epss
scoring_elements 0.98972
published_at 2026-04-04T12:55:00Z
4
value 0.78073
scoring_system epss
scoring_elements 0.99015
published_at 2026-04-13T12:55:00Z
5
value 0.78073
scoring_system epss
scoring_elements 0.99012
published_at 2026-04-09T12:55:00Z
6
value 0.78073
scoring_system epss
scoring_elements 0.99013
published_at 2026-04-11T12:55:00Z
7
value 0.78073
scoring_system epss
scoring_elements 0.99014
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=419931
reference_id 419931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=419931
4
reference_url https://httpd.apache.org/security/json/CVE-2007-5000.json
reference_id CVE-2007-5000
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-5000.json
5
reference_url https://access.redhat.com/errata/RHSA-2008:0004
reference_id RHSA-2008:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0004
6
reference_url https://access.redhat.com/errata/RHSA-2008:0005
reference_id RHSA-2008:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0005
7
reference_url https://access.redhat.com/errata/RHSA-2008:0006
reference_id RHSA-2008:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0006
8
reference_url https://access.redhat.com/errata/RHSA-2008:0007
reference_id RHSA-2008:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0007
9
reference_url https://access.redhat.com/errata/RHSA-2008:0008
reference_id RHSA-2008:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0008
10
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
11
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
12
reference_url https://usn.ubuntu.com/575-1/
reference_id USN-575-1
reference_type
scores
url https://usn.ubuntu.com/575-1/
fixed_packages
0
url pkg:apache/httpd@1.3.41
purl pkg:apache/httpd@1.3.41
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41
1
url pkg:apache/httpd@2.0.63
purl pkg:apache/httpd@2.0.63
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-fn5k-e2jr-6ube
9
vulnerability VCID-g2pp-aahn-mfcd
10
vulnerability VCID-kkfv-4jd1-bqdm
11
vulnerability VCID-pdj3-4txb-vych
12
vulnerability VCID-prd8-51a5-pygj
13
vulnerability VCID-qtav-hqnd-b7fa
14
vulnerability VCID-umuk-3n1q-3qet
15
vulnerability VCID-wycq-jwzz-q7hf
16
vulnerability VCID-y8nd-7h3r-7fh5
17
vulnerability VCID-ym93-sxb8-fkdm
18
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.63
2
url pkg:apache/httpd@2.2.8
purl pkg:apache/httpd@2.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-3cea-3rkm-r7gs
6
vulnerability VCID-3kyb-4yvt-f7e1
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5yez-d5nj-q7eq
11
vulnerability VCID-6bez-sgg8-cbbq
12
vulnerability VCID-6d43-sjqw-tbbp
13
vulnerability VCID-6pzx-1e5t-xbes
14
vulnerability VCID-7ftk-sajb-akh4
15
vulnerability VCID-7krj-8vat-3ydy
16
vulnerability VCID-7s2y-pvar-qqe3
17
vulnerability VCID-8axm-4anr-27ht
18
vulnerability VCID-8gcm-7q3n-q7bm
19
vulnerability VCID-d4rc-pnv5-6uc8
20
vulnerability VCID-ese4-47tg-efbw
21
vulnerability VCID-fn5k-e2jr-6ube
22
vulnerability VCID-fyrq-yg2u-jkc7
23
vulnerability VCID-fysz-5mr6-fbf1
24
vulnerability VCID-g2pp-aahn-mfcd
25
vulnerability VCID-gu44-7hkr-muae
26
vulnerability VCID-hcjv-md55-3fcr
27
vulnerability VCID-jt89-ruvk-1kbj
28
vulnerability VCID-k4kb-21tp-4kc8
29
vulnerability VCID-ke1s-451y-p3cz
30
vulnerability VCID-kkfv-4jd1-bqdm
31
vulnerability VCID-kpew-rarv-83dg
32
vulnerability VCID-pc2n-ga7g-byga
33
vulnerability VCID-pdj3-4txb-vych
34
vulnerability VCID-pdtf-5zv7-2qaf
35
vulnerability VCID-pj4f-awuq-73g6
36
vulnerability VCID-prd8-51a5-pygj
37
vulnerability VCID-qayj-kts9-3fde
38
vulnerability VCID-qtav-hqnd-b7fa
39
vulnerability VCID-rhk3-ujc1-q7fj
40
vulnerability VCID-ssvj-7g27-1ug6
41
vulnerability VCID-svyk-az69-qbfw
42
vulnerability VCID-t95h-xhtm-zbdv
43
vulnerability VCID-tbud-pwyt-aye9
44
vulnerability VCID-umuk-3n1q-3qet
45
vulnerability VCID-wycq-jwzz-q7hf
46
vulnerability VCID-y8nd-7h3r-7fh5
47
vulnerability VCID-ym93-sxb8-fkdm
48
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8
aliases CVE-2007-5000
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqkp-f1my-dbg9
6
url VCID-e2sp-bna5-mqb6
vulnerability_id VCID-e2sp-bna5-mqb6
summary A bug in the parsing of Allow/Deny rules using IP addresses without a netmask on big-endian 64-bit platforms causes the rules to fail to match.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0993
reference_id
reference_type
scores
0
value 0.05029
scoring_system epss
scoring_elements 0.89743
published_at 2026-04-13T12:55:00Z
1
value 0.05029
scoring_system epss
scoring_elements 0.89701
published_at 2026-04-01T12:55:00Z
2
value 0.05029
scoring_system epss
scoring_elements 0.89704
published_at 2026-04-02T12:55:00Z
3
value 0.05029
scoring_system epss
scoring_elements 0.89719
published_at 2026-04-04T12:55:00Z
4
value 0.05029
scoring_system epss
scoring_elements 0.89721
published_at 2026-04-07T12:55:00Z
5
value 0.05029
scoring_system epss
scoring_elements 0.89738
published_at 2026-04-08T12:55:00Z
6
value 0.05029
scoring_system epss
scoring_elements 0.89745
published_at 2026-04-09T12:55:00Z
7
value 0.05029
scoring_system epss
scoring_elements 0.89751
published_at 2026-04-11T12:55:00Z
8
value 0.05029
scoring_system epss
scoring_elements 0.8975
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0993
1
reference_url https://httpd.apache.org/security/json/CVE-2003-0993.json
reference_id CVE-2003-0993
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2003-0993.json
fixed_packages
0
url pkg:apache/httpd@1.3.31
purl pkg:apache/httpd@1.3.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
9
vulnerability VCID-x89d-7t1q-skcx
10
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.31
aliases CVE-2003-0993
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e2sp-bna5-mqb6
7
url VCID-j3mb-97k1-uuh9
vulnerability_id VCID-j3mb-97k1-uuh9
summary A flaw was found in the mod_status module. On sites where the server-status page is publicly accessible and ExtendedStatus is enabled this could lead to a cross-site scripting attack. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=186219
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=186219
1
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
3
reference_url http://httpd.apache.org/security/vulnerabilities_13.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_13.html
4
reference_url http://httpd.apache.org/security/vulnerabilities_20.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_20.html
5
reference_url http://httpd.apache.org/security/vulnerabilities_22.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html
6
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
7
reference_url http://osvdb.org/37052
reference_id
reference_type
scores
url http://osvdb.org/37052
8
reference_url http://rhn.redhat.com/errata/RHSA-2007-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0534.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2007-0556.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0556.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5752.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5752.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-5752
reference_id
reference_type
scores
0
value 0.18368
scoring_system epss
scoring_elements 0.95226
published_at 2026-04-13T12:55:00Z
1
value 0.18368
scoring_system epss
scoring_elements 0.95189
published_at 2026-04-01T12:55:00Z
2
value 0.18368
scoring_system epss
scoring_elements 0.95218
published_at 2026-04-09T12:55:00Z
3
value 0.18368
scoring_system epss
scoring_elements 0.95223
published_at 2026-04-12T12:55:00Z
4
value 0.18368
scoring_system epss
scoring_elements 0.95201
published_at 2026-04-02T12:55:00Z
5
value 0.18368
scoring_system epss
scoring_elements 0.95203
published_at 2026-04-04T12:55:00Z
6
value 0.18368
scoring_system epss
scoring_elements 0.95206
published_at 2026-04-07T12:55:00Z
7
value 0.18368
scoring_system epss
scoring_elements 0.95214
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-5752
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752
13
reference_url http://secunia.com/advisories/25827
reference_id
reference_type
scores
url http://secunia.com/advisories/25827
14
reference_url http://secunia.com/advisories/25830
reference_id
reference_type
scores
url http://secunia.com/advisories/25830
15
reference_url http://secunia.com/advisories/25873
reference_id
reference_type
scores
url http://secunia.com/advisories/25873
16
reference_url http://secunia.com/advisories/25920
reference_id
reference_type
scores
url http://secunia.com/advisories/25920
17
reference_url http://secunia.com/advisories/26273
reference_id
reference_type
scores
url http://secunia.com/advisories/26273
18
reference_url http://secunia.com/advisories/26443
reference_id
reference_type
scores
url http://secunia.com/advisories/26443
19
reference_url http://secunia.com/advisories/26458
reference_id
reference_type
scores
url http://secunia.com/advisories/26458
20
reference_url http://secunia.com/advisories/26508
reference_id
reference_type
scores
url http://secunia.com/advisories/26508
21
reference_url http://secunia.com/advisories/26822
reference_id
reference_type
scores
url http://secunia.com/advisories/26822
22
reference_url http://secunia.com/advisories/26842
reference_id
reference_type
scores
url http://secunia.com/advisories/26842
23
reference_url http://secunia.com/advisories/26993
reference_id
reference_type
scores
url http://secunia.com/advisories/26993
24
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
25
reference_url http://secunia.com/advisories/27563
reference_id
reference_type
scores
url http://secunia.com/advisories/27563
26
reference_url http://secunia.com/advisories/27732
reference_id
reference_type
scores
url http://secunia.com/advisories/27732
27
reference_url http://secunia.com/advisories/28212
reference_id
reference_type
scores
url http://secunia.com/advisories/28212
28
reference_url http://secunia.com/advisories/28224
reference_id
reference_type
scores
url http://secunia.com/advisories/28224
29
reference_url http://secunia.com/advisories/28606
reference_id
reference_type
scores
url http://secunia.com/advisories/28606
30
reference_url http://security.gentoo.org/glsa/glsa-200711-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-06.xml
31
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35097
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35097
32
reference_url https://issues.rpath.com/browse/RPL-1500
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1500
33
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
37
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
38
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
39
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
40
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
44
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
45
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
46
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
47
reference_url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
48
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
49
reference_url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
50
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
51
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
52
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154
53
reference_url https://rhn.redhat.com/errata/RHSA-2007-0533.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2007-0533.html
54
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
55
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
56
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
57
reference_url http://svn.apache.org/viewvc?view=rev&revision=549159
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=rev&revision=549159
58
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
59
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only
reference_id
reference_type
scores
url http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only
60
reference_url http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
reference_id
reference_type
scores
url http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
61
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
62
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:141
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:141
63
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
64
reference_url http://www.novell.com/linux/security/advisories/2007_61_apache2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_61_apache2.html
65
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
66
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
67
reference_url http://www.redhat.com/support/errata/RHSA-2007-0532.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0532.html
68
reference_url http://www.redhat.com/support/errata/RHSA-2007-0557.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0557.html
69
reference_url http://www.redhat.com/support/errata/RHSA-2008-0261.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0261.html
70
reference_url http://www.securityfocus.com/archive/1/505990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/505990/100/0/threaded
71
reference_url http://www.securityfocus.com/bid/24645
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24645
72
reference_url http://www.securitytracker.com/id?1018302
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018302
73
reference_url http://www.trustix.org/errata/2007/0026/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0026/
74
reference_url http://www.ubuntu.com/usn/usn-499-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-499-1
75
reference_url http://www.vupen.com/english/advisories/2007/2727
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2727
76
reference_url http://www.vupen.com/english/advisories/2007/3283
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3283
77
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
78
reference_url http://www.vupen.com/english/advisories/2007/4305
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/4305
79
reference_url http://www.vupen.com/english/advisories/2008/0233
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0233
80
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245112
reference_id 245112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245112
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
96
reference_url https://httpd.apache.org/security/json/CVE-2006-5752.json
reference_id CVE-2006-5752
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2006-5752.json
97
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-5752
reference_id CVE-2006-5752
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2006-5752
98
reference_url https://security.gentoo.org/glsa/200711-06
reference_id GLSA-200711-06
reference_type
scores
url https://security.gentoo.org/glsa/200711-06
99
reference_url https://access.redhat.com/errata/RHSA-2007:0532
reference_id RHSA-2007:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0532
100
reference_url https://access.redhat.com/errata/RHSA-2007:0533
reference_id RHSA-2007:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0533
101
reference_url https://access.redhat.com/errata/RHSA-2007:0534
reference_id RHSA-2007:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0534
102
reference_url https://access.redhat.com/errata/RHSA-2007:0556
reference_id RHSA-2007:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0556
103
reference_url https://access.redhat.com/errata/RHSA-2007:0557
reference_id RHSA-2007:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0557
104
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
105
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
106
reference_url https://usn.ubuntu.com/499-1/
reference_id USN-499-1
reference_type
scores
url https://usn.ubuntu.com/499-1/
fixed_packages
0
url pkg:apache/httpd@1.3.39
purl pkg:apache/httpd@1.3.39
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-kgpj-aexq-7kah
3
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.39
1
url pkg:apache/httpd@2.0.61
purl pkg:apache/httpd@2.0.61
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-dqkp-f1my-dbg9
9
vulnerability VCID-fn5k-e2jr-6ube
10
vulnerability VCID-g2pp-aahn-mfcd
11
vulnerability VCID-kgpj-aexq-7kah
12
vulnerability VCID-kkfv-4jd1-bqdm
13
vulnerability VCID-pdj3-4txb-vych
14
vulnerability VCID-prd8-51a5-pygj
15
vulnerability VCID-qtav-hqnd-b7fa
16
vulnerability VCID-ss79-kcpu-mqd5
17
vulnerability VCID-umuk-3n1q-3qet
18
vulnerability VCID-wycq-jwzz-q7hf
19
vulnerability VCID-y8nd-7h3r-7fh5
20
vulnerability VCID-ym93-sxb8-fkdm
21
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.61
2
url pkg:apache/httpd@2.2.6
purl pkg:apache/httpd@2.2.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-115r-fep2-fyfm
1
vulnerability VCID-1189-ej89-hybs
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2261-sdn2-zbbu
6
vulnerability VCID-2xc4-7zg9-y7fw
7
vulnerability VCID-3cea-3rkm-r7gs
8
vulnerability VCID-3kyb-4yvt-f7e1
9
vulnerability VCID-4zzy-q5zp-jkgm
10
vulnerability VCID-56kt-8bg6-zbcj
11
vulnerability VCID-5bej-9h7w-33c8
12
vulnerability VCID-5yez-d5nj-q7eq
13
vulnerability VCID-6bez-sgg8-cbbq
14
vulnerability VCID-6d43-sjqw-tbbp
15
vulnerability VCID-6pzx-1e5t-xbes
16
vulnerability VCID-7ftk-sajb-akh4
17
vulnerability VCID-7krj-8vat-3ydy
18
vulnerability VCID-7s2y-pvar-qqe3
19
vulnerability VCID-8axm-4anr-27ht
20
vulnerability VCID-8gcm-7q3n-q7bm
21
vulnerability VCID-d4rc-pnv5-6uc8
22
vulnerability VCID-dqkp-f1my-dbg9
23
vulnerability VCID-ese4-47tg-efbw
24
vulnerability VCID-fn5k-e2jr-6ube
25
vulnerability VCID-fyrq-yg2u-jkc7
26
vulnerability VCID-fysz-5mr6-fbf1
27
vulnerability VCID-g2pp-aahn-mfcd
28
vulnerability VCID-gu44-7hkr-muae
29
vulnerability VCID-hcjv-md55-3fcr
30
vulnerability VCID-jt89-ruvk-1kbj
31
vulnerability VCID-k4kb-21tp-4kc8
32
vulnerability VCID-ke1s-451y-p3cz
33
vulnerability VCID-kgpj-aexq-7kah
34
vulnerability VCID-kkfv-4jd1-bqdm
35
vulnerability VCID-kpew-rarv-83dg
36
vulnerability VCID-pc2n-ga7g-byga
37
vulnerability VCID-pdj3-4txb-vych
38
vulnerability VCID-pdtf-5zv7-2qaf
39
vulnerability VCID-pj4f-awuq-73g6
40
vulnerability VCID-prd8-51a5-pygj
41
vulnerability VCID-qayj-kts9-3fde
42
vulnerability VCID-qtav-hqnd-b7fa
43
vulnerability VCID-rhk3-ujc1-q7fj
44
vulnerability VCID-ss79-kcpu-mqd5
45
vulnerability VCID-ssvj-7g27-1ug6
46
vulnerability VCID-svyk-az69-qbfw
47
vulnerability VCID-t95h-xhtm-zbdv
48
vulnerability VCID-tbud-pwyt-aye9
49
vulnerability VCID-umuk-3n1q-3qet
50
vulnerability VCID-wycq-jwzz-q7hf
51
vulnerability VCID-y8nd-7h3r-7fh5
52
vulnerability VCID-ym93-sxb8-fkdm
53
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6
aliases CVE-2006-5752
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j3mb-97k1-uuh9
8
url VCID-kcwg-hswv-2uf7
vulnerability_id VCID-kcwg-hswv-2uf7
summary A flaw in mod_imap when using the Referer directive with image maps. In certain site configurations a remote attacker could perform a cross-site scripting attack if a victim can be forced to visit a malicious URL using certain web browsers.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
1
reference_url http://docs.info.apple.com/article.html?artnum=307562
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=307562
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449
3
reference_url http://issues.apache.org/bugzilla/show_bug.cgi?id=37874
reference_id
reference_type
scores
url http://issues.apache.org/bugzilla/show_bug.cgi?id=37874
4
reference_url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
5
reference_url http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
6
reference_url http://lists.suse.com/archive/suse-security-announce/2007-May/0005.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-May/0005.html
7
reference_url http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
reference_id
reference_type
scores
url http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
8
reference_url http://marc.info/?l=bugtraq&m=130497311408250&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130497311408250&w=2
9
reference_url http://rhn.redhat.com/errata/RHSA-2006-0159.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0159.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2006-0692.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0692.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3352.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3352
reference_id
reference_type
scores
0
value 0.25577
scoring_system epss
scoring_elements 0.96231
published_at 2026-04-13T12:55:00Z
1
value 0.25577
scoring_system epss
scoring_elements 0.96193
published_at 2026-04-01T12:55:00Z
2
value 0.25577
scoring_system epss
scoring_elements 0.9623
published_at 2026-04-11T12:55:00Z
3
value 0.25577
scoring_system epss
scoring_elements 0.96229
published_at 2026-04-12T12:55:00Z
4
value 0.25577
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-02T12:55:00Z
5
value 0.25577
scoring_system epss
scoring_elements 0.96208
published_at 2026-04-04T12:55:00Z
6
value 0.25577
scoring_system epss
scoring_elements 0.96213
published_at 2026-04-07T12:55:00Z
7
value 0.25577
scoring_system epss
scoring_elements 0.96222
published_at 2026-04-08T12:55:00Z
8
value 0.25577
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3352
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352
14
reference_url http://secunia.com/advisories/17319
reference_id
reference_type
scores
url http://secunia.com/advisories/17319
15
reference_url http://secunia.com/advisories/18008
reference_id
reference_type
scores
url http://secunia.com/advisories/18008
16
reference_url http://secunia.com/advisories/18333
reference_id
reference_type
scores
url http://secunia.com/advisories/18333
17
reference_url http://secunia.com/advisories/18339
reference_id
reference_type
scores
url http://secunia.com/advisories/18339
18
reference_url http://secunia.com/advisories/18340
reference_id
reference_type
scores
url http://secunia.com/advisories/18340
19
reference_url http://secunia.com/advisories/18429
reference_id
reference_type
scores
url http://secunia.com/advisories/18429
20
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
21
reference_url http://secunia.com/advisories/18526
reference_id
reference_type
scores
url http://secunia.com/advisories/18526
22
reference_url http://secunia.com/advisories/18585
reference_id
reference_type
scores
url http://secunia.com/advisories/18585
23
reference_url http://secunia.com/advisories/18743
reference_id
reference_type
scores
url http://secunia.com/advisories/18743
24
reference_url http://secunia.com/advisories/19012
reference_id
reference_type
scores
url http://secunia.com/advisories/19012
25
reference_url http://secunia.com/advisories/20046
reference_id
reference_type
scores
url http://secunia.com/advisories/20046
26
reference_url http://secunia.com/advisories/20670
reference_id
reference_type
scores
url http://secunia.com/advisories/20670
27
reference_url http://secunia.com/advisories/21744
reference_id
reference_type
scores
url http://secunia.com/advisories/21744
28
reference_url http://secunia.com/advisories/22140
reference_id
reference_type
scores
url http://secunia.com/advisories/22140
29
reference_url http://secunia.com/advisories/22368
reference_id
reference_type
scores
url http://secunia.com/advisories/22368
30
reference_url http://secunia.com/advisories/22388
reference_id
reference_type
scores
url http://secunia.com/advisories/22388
31
reference_url http://secunia.com/advisories/22669
reference_id
reference_type
scores
url http://secunia.com/advisories/22669
32
reference_url http://secunia.com/advisories/23260
reference_id
reference_type
scores
url http://secunia.com/advisories/23260
33
reference_url http://secunia.com/advisories/25239
reference_id
reference_type
scores
url http://secunia.com/advisories/25239
34
reference_url http://secunia.com/advisories/29420
reference_id
reference_type
scores
url http://secunia.com/advisories/29420
35
reference_url http://secunia.com/advisories/29849
reference_id
reference_type
scores
url http://secunia.com/advisories/29849
36
reference_url http://secunia.com/advisories/30430
reference_id
reference_type
scores
url http://secunia.com/advisories/30430
37
reference_url http://securitytracker.com/id?1015344
reference_id
reference_type
scores
url http://securitytracker.com/id?1015344
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.470158
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.470158
39
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.685483
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.685483
40
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
44
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
45
reference_url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
46
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
47
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
48
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
49
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
50
reference_url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
51
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
52
reference_url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
53
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
54
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10480
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10480
55
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1
56
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1
57
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only
reference_id
reference_type
scores
url http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only
58
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PK25355&apar=only
reference_id
reference_type
scores
url http://www-1.ibm.com/support/search.wss?rs=0&q=PK25355&apar=only
59
reference_url http://www.debian.org/security/2006/dsa-1167
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1167
60
reference_url http://www.gentoo.org/security/en/glsa/glsa-200602-03.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200602-03.xml
61
reference_url http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007
reference_id
reference_type
scores
url http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007
62
reference_url http://www.novell.com/linux/security/advisories/2006_43_apache.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_43_apache.html
63
reference_url http://www.openpkg.org/security/OpenPKG-SA-2005.029-apache.txt
reference_id
reference_type
scores
url http://www.openpkg.org/security/OpenPKG-SA-2005.029-apache.txt
64
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
65
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00060.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00060.html
66
reference_url http://www.redhat.com/support/errata/RHSA-2006-0158.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0158.html
67
reference_url http://www.securityfocus.com/archive/1/425399/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/425399/100/0/threaded
68
reference_url http://www.securityfocus.com/archive/1/445206/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/445206/100/0/threaded
69
reference_url http://www.securityfocus.com/archive/1/450315/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/450315/100/0/threaded
70
reference_url http://www.securityfocus.com/archive/1/450321/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/450321/100/0/threaded
71
reference_url http://www.securityfocus.com/bid/15834
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15834
72
reference_url http://www.trustix.org/errata/2005/0074/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0074/
73
reference_url http://www.ubuntulinux.org/usn/usn-241-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-241-1
74
reference_url http://www.us-cert.gov/cas/techalerts/TA08-150A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-150A.html
75
reference_url http://www.vupen.com/english/advisories/2005/2870
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2870
76
reference_url http://www.vupen.com/english/advisories/2006/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/2423
77
reference_url http://www.vupen.com/english/advisories/2006/3995
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/3995
78
reference_url http://www.vupen.com/english/advisories/2006/4015
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4015
79
reference_url http://www.vupen.com/english/advisories/2006/4300
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4300
80
reference_url http://www.vupen.com/english/advisories/2006/4868
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4868
81
reference_url http://www.vupen.com/english/advisories/2008/0924/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0924/references
82
reference_url http://www.vupen.com/english/advisories/2008/1246/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1246/references
83
reference_url http://www.vupen.com/english/advisories/2008/1697
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1697
84
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343467
reference_id 343467
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343467
85
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430524
reference_id 430524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430524
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
88
reference_url https://httpd.apache.org/security/json/CVE-2005-3352.json
reference_id CVE-2005-3352
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2005-3352.json
89
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3352
reference_id CVE-2005-3352
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-3352
90
reference_url https://security.gentoo.org/glsa/200602-03
reference_id GLSA-200602-03
reference_type
scores
url https://security.gentoo.org/glsa/200602-03
91
reference_url https://access.redhat.com/errata/RHSA-2005:882
reference_id RHSA-2005:882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:882
92
reference_url https://access.redhat.com/errata/RHSA-2006:0158
reference_id RHSA-2006:0158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0158
93
reference_url https://access.redhat.com/errata/RHSA-2006:0159
reference_id RHSA-2006:0159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0159
94
reference_url https://access.redhat.com/errata/RHSA-2006:0692
reference_id RHSA-2006:0692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0692
95
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
96
reference_url https://usn.ubuntu.com/241-1/
reference_id USN-241-1
reference_type
scores
url https://usn.ubuntu.com/241-1/
fixed_packages
0
url pkg:apache/httpd@1.3.35
purl pkg:apache/httpd@1.3.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kgpj-aexq-7kah
4
vulnerability VCID-prd8-51a5-pygj
5
vulnerability VCID-qf2e-kgxk-pkhc
6
vulnerability VCID-srxw-jjvr-p3d5
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.35
1
url pkg:apache/httpd@2.0.58
purl pkg:apache/httpd@2.0.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-1nh6-77uc-xbak
2
vulnerability VCID-3cea-3rkm-r7gs
3
vulnerability VCID-4zzy-q5zp-jkgm
4
vulnerability VCID-56kt-8bg6-zbcj
5
vulnerability VCID-5yez-d5nj-q7eq
6
vulnerability VCID-6d43-sjqw-tbbp
7
vulnerability VCID-7krj-8vat-3ydy
8
vulnerability VCID-95zk-suqh-j7e7
9
vulnerability VCID-d4rc-pnv5-6uc8
10
vulnerability VCID-dqkp-f1my-dbg9
11
vulnerability VCID-fn5k-e2jr-6ube
12
vulnerability VCID-g2pp-aahn-mfcd
13
vulnerability VCID-j3mb-97k1-uuh9
14
vulnerability VCID-kgpj-aexq-7kah
15
vulnerability VCID-kkfv-4jd1-bqdm
16
vulnerability VCID-pdj3-4txb-vych
17
vulnerability VCID-prd8-51a5-pygj
18
vulnerability VCID-qf2e-kgxk-pkhc
19
vulnerability VCID-qtav-hqnd-b7fa
20
vulnerability VCID-srxw-jjvr-p3d5
21
vulnerability VCID-ss79-kcpu-mqd5
22
vulnerability VCID-umuk-3n1q-3qet
23
vulnerability VCID-wycq-jwzz-q7hf
24
vulnerability VCID-y8nd-7h3r-7fh5
25
vulnerability VCID-ym93-sxb8-fkdm
26
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.58
2
url pkg:apache/httpd@2.2.2
purl pkg:apache/httpd@2.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-115r-fep2-fyfm
1
vulnerability VCID-1189-ej89-hybs
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1nh6-77uc-xbak
5
vulnerability VCID-1zk6-7wv2-ukcz
6
vulnerability VCID-2261-sdn2-zbbu
7
vulnerability VCID-2xc4-7zg9-y7fw
8
vulnerability VCID-3cea-3rkm-r7gs
9
vulnerability VCID-3kyb-4yvt-f7e1
10
vulnerability VCID-4zzy-q5zp-jkgm
11
vulnerability VCID-56kt-8bg6-zbcj
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5yez-d5nj-q7eq
14
vulnerability VCID-6bez-sgg8-cbbq
15
vulnerability VCID-6d43-sjqw-tbbp
16
vulnerability VCID-6pzx-1e5t-xbes
17
vulnerability VCID-7ftk-sajb-akh4
18
vulnerability VCID-7krj-8vat-3ydy
19
vulnerability VCID-7s2y-pvar-qqe3
20
vulnerability VCID-8axm-4anr-27ht
21
vulnerability VCID-8gcm-7q3n-q7bm
22
vulnerability VCID-95zk-suqh-j7e7
23
vulnerability VCID-d4rc-pnv5-6uc8
24
vulnerability VCID-dqkp-f1my-dbg9
25
vulnerability VCID-ese4-47tg-efbw
26
vulnerability VCID-fn5k-e2jr-6ube
27
vulnerability VCID-fyrq-yg2u-jkc7
28
vulnerability VCID-fysz-5mr6-fbf1
29
vulnerability VCID-g2pp-aahn-mfcd
30
vulnerability VCID-gu44-7hkr-muae
31
vulnerability VCID-hcjv-md55-3fcr
32
vulnerability VCID-j3mb-97k1-uuh9
33
vulnerability VCID-jt89-ruvk-1kbj
34
vulnerability VCID-k4kb-21tp-4kc8
35
vulnerability VCID-ke1s-451y-p3cz
36
vulnerability VCID-kgpj-aexq-7kah
37
vulnerability VCID-kkfv-4jd1-bqdm
38
vulnerability VCID-kpew-rarv-83dg
39
vulnerability VCID-pc2n-ga7g-byga
40
vulnerability VCID-pdj3-4txb-vych
41
vulnerability VCID-pdtf-5zv7-2qaf
42
vulnerability VCID-pj4f-awuq-73g6
43
vulnerability VCID-prd8-51a5-pygj
44
vulnerability VCID-qayj-kts9-3fde
45
vulnerability VCID-qf2e-kgxk-pkhc
46
vulnerability VCID-qtav-hqnd-b7fa
47
vulnerability VCID-rhk3-ujc1-q7fj
48
vulnerability VCID-srxw-jjvr-p3d5
49
vulnerability VCID-ss79-kcpu-mqd5
50
vulnerability VCID-ssvj-7g27-1ug6
51
vulnerability VCID-svyk-az69-qbfw
52
vulnerability VCID-t95h-xhtm-zbdv
53
vulnerability VCID-tbud-pwyt-aye9
54
vulnerability VCID-umuk-3n1q-3qet
55
vulnerability VCID-wycq-jwzz-q7hf
56
vulnerability VCID-y8nd-7h3r-7fh5
57
vulnerability VCID-ym93-sxb8-fkdm
58
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.2
aliases CVE-2005-3352
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kcwg-hswv-2uf7
9
url VCID-kgpj-aexq-7kah
vulnerability_id VCID-kgpj-aexq-7kah
summary A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6388.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6388
reference_id
reference_type
scores
0
value 0.85047
scoring_system epss
scoring_elements 0.99353
published_at 2026-04-13T12:55:00Z
1
value 0.85047
scoring_system epss
scoring_elements 0.99344
published_at 2026-04-01T12:55:00Z
2
value 0.85047
scoring_system epss
scoring_elements 0.99345
published_at 2026-04-02T12:55:00Z
3
value 0.85047
scoring_system epss
scoring_elements 0.99347
published_at 2026-04-04T12:55:00Z
4
value 0.85047
scoring_system epss
scoring_elements 0.99348
published_at 2026-04-07T12:55:00Z
5
value 0.85047
scoring_system epss
scoring_elements 0.9935
published_at 2026-04-09T12:55:00Z
6
value 0.85047
scoring_system epss
scoring_elements 0.99352
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=427228
reference_id 427228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=427228
4
reference_url https://httpd.apache.org/security/json/CVE-2007-6388.json
reference_id CVE-2007-6388
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-6388.json
5
reference_url https://access.redhat.com/errata/RHSA-2008:0004
reference_id RHSA-2008:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0004
6
reference_url https://access.redhat.com/errata/RHSA-2008:0005
reference_id RHSA-2008:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0005
7
reference_url https://access.redhat.com/errata/RHSA-2008:0006
reference_id RHSA-2008:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0006
8
reference_url https://access.redhat.com/errata/RHSA-2008:0007
reference_id RHSA-2008:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0007
9
reference_url https://access.redhat.com/errata/RHSA-2008:0008
reference_id RHSA-2008:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0008
10
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
11
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
12
reference_url https://usn.ubuntu.com/575-1/
reference_id USN-575-1
reference_type
scores
url https://usn.ubuntu.com/575-1/
fixed_packages
0
url pkg:apache/httpd@1.3.41
purl pkg:apache/httpd@1.3.41
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41
1
url pkg:apache/httpd@2.0.63
purl pkg:apache/httpd@2.0.63
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-fn5k-e2jr-6ube
9
vulnerability VCID-g2pp-aahn-mfcd
10
vulnerability VCID-kkfv-4jd1-bqdm
11
vulnerability VCID-pdj3-4txb-vych
12
vulnerability VCID-prd8-51a5-pygj
13
vulnerability VCID-qtav-hqnd-b7fa
14
vulnerability VCID-umuk-3n1q-3qet
15
vulnerability VCID-wycq-jwzz-q7hf
16
vulnerability VCID-y8nd-7h3r-7fh5
17
vulnerability VCID-ym93-sxb8-fkdm
18
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.63
2
url pkg:apache/httpd@2.2.8
purl pkg:apache/httpd@2.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-3cea-3rkm-r7gs
6
vulnerability VCID-3kyb-4yvt-f7e1
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5yez-d5nj-q7eq
11
vulnerability VCID-6bez-sgg8-cbbq
12
vulnerability VCID-6d43-sjqw-tbbp
13
vulnerability VCID-6pzx-1e5t-xbes
14
vulnerability VCID-7ftk-sajb-akh4
15
vulnerability VCID-7krj-8vat-3ydy
16
vulnerability VCID-7s2y-pvar-qqe3
17
vulnerability VCID-8axm-4anr-27ht
18
vulnerability VCID-8gcm-7q3n-q7bm
19
vulnerability VCID-d4rc-pnv5-6uc8
20
vulnerability VCID-ese4-47tg-efbw
21
vulnerability VCID-fn5k-e2jr-6ube
22
vulnerability VCID-fyrq-yg2u-jkc7
23
vulnerability VCID-fysz-5mr6-fbf1
24
vulnerability VCID-g2pp-aahn-mfcd
25
vulnerability VCID-gu44-7hkr-muae
26
vulnerability VCID-hcjv-md55-3fcr
27
vulnerability VCID-jt89-ruvk-1kbj
28
vulnerability VCID-k4kb-21tp-4kc8
29
vulnerability VCID-ke1s-451y-p3cz
30
vulnerability VCID-kkfv-4jd1-bqdm
31
vulnerability VCID-kpew-rarv-83dg
32
vulnerability VCID-pc2n-ga7g-byga
33
vulnerability VCID-pdj3-4txb-vych
34
vulnerability VCID-pdtf-5zv7-2qaf
35
vulnerability VCID-pj4f-awuq-73g6
36
vulnerability VCID-prd8-51a5-pygj
37
vulnerability VCID-qayj-kts9-3fde
38
vulnerability VCID-qtav-hqnd-b7fa
39
vulnerability VCID-rhk3-ujc1-q7fj
40
vulnerability VCID-ssvj-7g27-1ug6
41
vulnerability VCID-svyk-az69-qbfw
42
vulnerability VCID-t95h-xhtm-zbdv
43
vulnerability VCID-tbud-pwyt-aye9
44
vulnerability VCID-umuk-3n1q-3qet
45
vulnerability VCID-wycq-jwzz-q7hf
46
vulnerability VCID-y8nd-7h3r-7fh5
47
vulnerability VCID-ym93-sxb8-fkdm
48
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8
aliases CVE-2007-6388
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgpj-aexq-7kah
10
url VCID-me4r-1qb6-dqdf
vulnerability_id VCID-me4r-1qb6-dqdf
summary A flaw in the handling of invalid Expect headers. If an attacker can influence the Expect header that a victim sends to a target site they could perform a cross-site scripting attack. It is known that some versions of Flash can set an arbitrary Expect header which can trigger this flaw. Not marked as a security issue for 2.0 or 2.2 as the cross-site scripting is only returned to the victim after the server times out a connection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3918.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3918
reference_id
reference_type
scores
0
value 0.91373
scoring_system epss
scoring_elements 0.99655
published_at 2026-04-04T12:55:00Z
1
value 0.91373
scoring_system epss
scoring_elements 0.99654
published_at 2026-04-01T12:55:00Z
2
value 0.91373
scoring_system epss
scoring_elements 0.99653
published_at 2026-04-02T12:55:00Z
3
value 0.91373
scoring_system epss
scoring_elements 0.99659
published_at 2026-04-13T12:55:00Z
4
value 0.91373
scoring_system epss
scoring_elements 0.99656
published_at 2026-04-07T12:55:00Z
5
value 0.91373
scoring_system epss
scoring_elements 0.99658
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=200732
reference_id 200732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=200732
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381376
reference_id 381376
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381376
5
reference_url https://httpd.apache.org/security/json/CVE-2006-3918.json
reference_id CVE-2006-3918
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2006-3918.json
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/28424.txt
reference_id CVE-2006-3918;OSVDB-27488
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/28424.txt
7
reference_url https://www.securityfocus.com/bid/19661/info
reference_id CVE-2006-3918;OSVDB-27488
reference_type exploit
scores
url https://www.securityfocus.com/bid/19661/info
8
reference_url https://access.redhat.com/errata/RHSA-2006:0618
reference_id RHSA-2006:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0618
9
reference_url https://access.redhat.com/errata/RHSA-2006:0619
reference_id RHSA-2006:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0619
10
reference_url https://access.redhat.com/errata/RHSA-2006:0692
reference_id RHSA-2006:0692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0692
11
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
12
reference_url https://usn.ubuntu.com/575-1/
reference_id USN-575-1
reference_type
scores
url https://usn.ubuntu.com/575-1/
fixed_packages
0
url pkg:apache/httpd@1.3.35
purl pkg:apache/httpd@1.3.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kgpj-aexq-7kah
4
vulnerability VCID-prd8-51a5-pygj
5
vulnerability VCID-qf2e-kgxk-pkhc
6
vulnerability VCID-srxw-jjvr-p3d5
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.35
aliases CVE-2006-3918
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-me4r-1qb6-dqdf
11
url VCID-nkgw-gs9g-ckft
vulnerability_id VCID-nkgw-gs9g-ckft
summary Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote attackers to execute script as other web page visitors via the Host: header.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0840.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0840
reference_id
reference_type
scores
0
value 0.91102
scoring_system epss
scoring_elements 0.99642
published_at 2026-04-04T12:55:00Z
1
value 0.91102
scoring_system epss
scoring_elements 0.99641
published_at 2026-04-02T12:55:00Z
2
value 0.91102
scoring_system epss
scoring_elements 0.99644
published_at 2026-04-11T12:55:00Z
3
value 0.91102
scoring_system epss
scoring_elements 0.99645
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0840
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616823
reference_id 1616823
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616823
4
reference_url https://httpd.apache.org/security/json/CVE-2002-0840.json
reference_id CVE-2002-0840
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2002-0840.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21885.txt
reference_id CVE-2002-0840;OSVDB-862
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/21885.txt
6
reference_url https://www.securityfocus.com/bid/5847/info
reference_id CVE-2002-0840;OSVDB-862
reference_type exploit
scores
url https://www.securityfocus.com/bid/5847/info
7
reference_url https://access.redhat.com/errata/RHSA-2002:222
reference_id RHSA-2002:222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:222
8
reference_url https://access.redhat.com/errata/RHSA-2002:243
reference_id RHSA-2002:243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:243
9
reference_url https://access.redhat.com/errata/RHSA-2002:244
reference_id RHSA-2002:244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:244
10
reference_url https://access.redhat.com/errata/RHSA-2002:248
reference_id RHSA-2002:248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:248
11
reference_url https://access.redhat.com/errata/RHSA-2002:251
reference_id RHSA-2002:251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:251
12
reference_url https://access.redhat.com/errata/RHSA-2003:106
reference_id RHSA-2003:106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:106
fixed_packages
0
url pkg:apache/httpd@1.3.27
purl pkg:apache/httpd@1.3.27
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-6kzq-pwjb-bug6
3
vulnerability VCID-dqkp-f1my-dbg9
4
vulnerability VCID-e2sp-bna5-mqb6
5
vulnerability VCID-j3mb-97k1-uuh9
6
vulnerability VCID-kcwg-hswv-2uf7
7
vulnerability VCID-kgpj-aexq-7kah
8
vulnerability VCID-me4r-1qb6-dqdf
9
vulnerability VCID-prd8-51a5-pygj
10
vulnerability VCID-srxw-jjvr-p3d5
11
vulnerability VCID-ug4a-zxkg-cbew
12
vulnerability VCID-x89d-7t1q-skcx
13
vulnerability VCID-yjqs-kszf-yka1
14
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.27
1
url pkg:apache/httpd@2.0.43
purl pkg:apache/httpd@2.0.43
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-112d-h2a5-xbc4
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1nh6-77uc-xbak
3
vulnerability VCID-1v86-mmdn-z3fk
4
vulnerability VCID-3cea-3rkm-r7gs
5
vulnerability VCID-3m9y-maes-5ycp
6
vulnerability VCID-3wbg-bxvj-1kca
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5yez-d5nj-q7eq
10
vulnerability VCID-6d43-sjqw-tbbp
11
vulnerability VCID-76s2-26cr-syd1
12
vulnerability VCID-7krj-8vat-3ydy
13
vulnerability VCID-95zk-suqh-j7e7
14
vulnerability VCID-9b9s-sz9t-rubp
15
vulnerability VCID-9xk2-as1c-7kd2
16
vulnerability VCID-a86d-f4nd-eqhh
17
vulnerability VCID-bfvg-u6sz-6qc6
18
vulnerability VCID-d4rc-pnv5-6uc8
19
vulnerability VCID-d66x-55ub-vkfw
20
vulnerability VCID-dqkp-f1my-dbg9
21
vulnerability VCID-en6m-ye18-97hk
22
vulnerability VCID-fn5k-e2jr-6ube
23
vulnerability VCID-fq9j-uewn-q7h7
24
vulnerability VCID-g1jc-8vza-u3ad
25
vulnerability VCID-g2pp-aahn-mfcd
26
vulnerability VCID-ggje-ade3-n3hg
27
vulnerability VCID-ggz5-fc8e-1udj
28
vulnerability VCID-gua1-tqya-vybq
29
vulnerability VCID-j3mb-97k1-uuh9
30
vulnerability VCID-kcwg-hswv-2uf7
31
vulnerability VCID-kgpj-aexq-7kah
32
vulnerability VCID-kkfv-4jd1-bqdm
33
vulnerability VCID-m8uk-byje-dqey
34
vulnerability VCID-pdj3-4txb-vych
35
vulnerability VCID-prd8-51a5-pygj
36
vulnerability VCID-pufp-t6dh-xqhv
37
vulnerability VCID-qtav-hqnd-b7fa
38
vulnerability VCID-qufv-kta7-1feu
39
vulnerability VCID-rhhj-jhej-gfcj
40
vulnerability VCID-srxw-jjvr-p3d5
41
vulnerability VCID-ss79-kcpu-mqd5
42
vulnerability VCID-tbdg-kev6-5uep
43
vulnerability VCID-umuk-3n1q-3qet
44
vulnerability VCID-v2g6-h93b-euer
45
vulnerability VCID-vqs2-5x99-7qfd
46
vulnerability VCID-vud7-n4uk-2be8
47
vulnerability VCID-w18t-67us-kufe
48
vulnerability VCID-wycq-jwzz-q7hf
49
vulnerability VCID-y56e-kuj4-97f6
50
vulnerability VCID-y8nd-7h3r-7fh5
51
vulnerability VCID-yjqs-kszf-yka1
52
vulnerability VCID-ym93-sxb8-fkdm
53
vulnerability VCID-za9f-j42y-ukdp
54
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.43
aliases CVE-2002-0840
risk_score 4.2
exploitability 2.0
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkgw-gs9g-ckft
12
url VCID-prd8-51a5-pygj
vulnerability_id VCID-prd8-51a5-pygj
summary
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released.
Patches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
reference_id
reference_type
scores
0
value 0.79136
scoring_system epss
scoring_elements 0.99065
published_at 2026-04-13T12:55:00Z
1
value 0.79136
scoring_system epss
scoring_elements 0.99054
published_at 2026-04-01T12:55:00Z
2
value 0.79136
scoring_system epss
scoring_elements 0.99055
published_at 2026-04-02T12:55:00Z
3
value 0.79136
scoring_system epss
scoring_elements 0.99059
published_at 2026-04-04T12:55:00Z
4
value 0.79136
scoring_system epss
scoring_elements 0.99062
published_at 2026-04-07T12:55:00Z
5
value 0.79136
scoring_system epss
scoring_elements 0.99063
published_at 2026-04-08T12:55:00Z
6
value 0.79136
scoring_system epss
scoring_elements 0.99064
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=740045
reference_id 740045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=740045
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3368.json
reference_id CVE-2011-3368
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3368.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
reference_id CVE-2011-3368;OSVDB-76079
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
6
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
7
reference_url https://access.redhat.com/errata/RHSA-2011:1391
reference_id RHSA-2011:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1391
8
reference_url https://access.redhat.com/errata/RHSA-2011:1392
reference_id RHSA-2011:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1392
9
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
10
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
11
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:apache/httpd@2.0.65
purl pkg:apache/httpd@2.0.65
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.65
1
url pkg:apache/httpd@2.2.22
purl pkg:apache/httpd@2.2.22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-5bej-9h7w-33c8
6
vulnerability VCID-6bez-sgg8-cbbq
7
vulnerability VCID-6pzx-1e5t-xbes
8
vulnerability VCID-8axm-4anr-27ht
9
vulnerability VCID-8gcm-7q3n-q7bm
10
vulnerability VCID-ese4-47tg-efbw
11
vulnerability VCID-fyrq-yg2u-jkc7
12
vulnerability VCID-jt89-ruvk-1kbj
13
vulnerability VCID-k4kb-21tp-4kc8
14
vulnerability VCID-ke1s-451y-p3cz
15
vulnerability VCID-kpew-rarv-83dg
16
vulnerability VCID-pc2n-ga7g-byga
17
vulnerability VCID-qayj-kts9-3fde
18
vulnerability VCID-rhk3-ujc1-q7fj
19
vulnerability VCID-ssvj-7g27-1ug6
20
vulnerability VCID-tbud-pwyt-aye9
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22
aliases CVE-2011-3368
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prd8-51a5-pygj
13
url VCID-sgfs-58ym-fygd
vulnerability_id VCID-sgfs-58ym-fygd
summary A vulnerability was found in the split-logfile support program. A request with a specially crafted Host: header could allow any file with a .log extension on the system to be written to.
references
0
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000430
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000430
1
reference_url http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077
reference_id
reference_type
scores
url http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2001-0730.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2001-0730.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2001-0730
reference_id
reference_type
scores
0
value 0.07796
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-13T12:55:00Z
1
value 0.07796
scoring_system epss
scoring_elements 0.91976
published_at 2026-04-11T12:55:00Z
2
value 0.07796
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-12T12:55:00Z
3
value 0.07796
scoring_system epss
scoring_elements 0.91933
published_at 2026-04-01T12:55:00Z
4
value 0.07796
scoring_system epss
scoring_elements 0.91941
published_at 2026-04-02T12:55:00Z
5
value 0.07796
scoring_system epss
scoring_elements 0.91949
published_at 2026-04-04T12:55:00Z
6
value 0.07796
scoring_system epss
scoring_elements 0.91955
published_at 2026-04-07T12:55:00Z
7
value 0.07796
scoring_system epss
scoring_elements 0.91968
published_at 2026-04-08T12:55:00Z
8
value 0.07796
scoring_system epss
scoring_elements 0.91973
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2001-0730
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/7419
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/7419
5
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
9
reference_url http://www.apacheweek.com/issues/01-09-28#security
reference_id
reference_type
scores
url http://www.apacheweek.com/issues/01-09-28#security
10
reference_url http://www.linuxsecurity.com/advisories/other_advisory-1649.html
reference_id
reference_type
scores
url http://www.linuxsecurity.com/advisories/other_advisory-1649.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2001-126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2001-126.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2001-164.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2001-164.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616611
reference_id 1616611
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616611
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
15
reference_url https://httpd.apache.org/security/json/CVE-2001-0730.json
reference_id CVE-2001-0730
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2001-0730.json
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2001-0730
reference_id CVE-2001-0730
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2001-0730
17
reference_url https://access.redhat.com/errata/RHSA-2001:126
reference_id RHSA-2001:126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2001:126
18
reference_url https://access.redhat.com/errata/RHSA-2001:164
reference_id RHSA-2001:164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2001:164
fixed_packages
0
url pkg:apache/httpd@1.3.22
purl pkg:apache/httpd@1.3.22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-881e-dkhk-y7fc
3
vulnerability VCID-a86d-f4nd-eqhh
4
vulnerability VCID-bu8e-hpcy-jqda
5
vulnerability VCID-d5w4-vnbd-afdj
6
vulnerability VCID-dqkp-f1my-dbg9
7
vulnerability VCID-e2sp-bna5-mqb6
8
vulnerability VCID-j3mb-97k1-uuh9
9
vulnerability VCID-kcwg-hswv-2uf7
10
vulnerability VCID-kgpj-aexq-7kah
11
vulnerability VCID-me4r-1qb6-dqdf
12
vulnerability VCID-nkgw-gs9g-ckft
13
vulnerability VCID-prd8-51a5-pygj
14
vulnerability VCID-sn3y-mpbk-hqe8
15
vulnerability VCID-srxw-jjvr-p3d5
16
vulnerability VCID-ug4a-zxkg-cbew
17
vulnerability VCID-yjqs-kszf-yka1
18
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.22
aliases CVE-2001-0730
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sgfs-58ym-fygd
14
url VCID-sn3y-mpbk-hqe8
vulnerability_id VCID-sn3y-mpbk-hqe8
summary Buffer overflows in the benchmarking utility ab could be exploited if ab is run against a malicious server
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0843.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2002-0843
reference_id
reference_type
scores
0
value 0.03769
scoring_system epss
scoring_elements 0.88046
published_at 2026-04-13T12:55:00Z
1
value 0.03769
scoring_system epss
scoring_elements 0.87988
published_at 2026-04-01T12:55:00Z
2
value 0.03769
scoring_system epss
scoring_elements 0.87998
published_at 2026-04-02T12:55:00Z
3
value 0.03769
scoring_system epss
scoring_elements 0.88012
published_at 2026-04-04T12:55:00Z
4
value 0.03769
scoring_system epss
scoring_elements 0.88017
published_at 2026-04-07T12:55:00Z
5
value 0.03769
scoring_system epss
scoring_elements 0.88036
published_at 2026-04-08T12:55:00Z
6
value 0.03769
scoring_system epss
scoring_elements 0.88043
published_at 2026-04-09T12:55:00Z
7
value 0.03769
scoring_system epss
scoring_elements 0.88053
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2002-0843
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616824
reference_id 1616824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616824
3
reference_url https://httpd.apache.org/security/json/CVE-2002-0843.json
reference_id CVE-2002-0843
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2002-0843.json
4
reference_url https://access.redhat.com/errata/RHSA-2002:222
reference_id RHSA-2002:222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:222
5
reference_url https://access.redhat.com/errata/RHSA-2002:243
reference_id RHSA-2002:243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:243
6
reference_url https://access.redhat.com/errata/RHSA-2002:244
reference_id RHSA-2002:244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:244
7
reference_url https://access.redhat.com/errata/RHSA-2002:248
reference_id RHSA-2002:248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:248
8
reference_url https://access.redhat.com/errata/RHSA-2002:251
reference_id RHSA-2002:251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2002:251
9
reference_url https://access.redhat.com/errata/RHSA-2003:106
reference_id RHSA-2003:106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:106
fixed_packages
0
url pkg:apache/httpd@1.3.27
purl pkg:apache/httpd@1.3.27
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-6kzq-pwjb-bug6
3
vulnerability VCID-dqkp-f1my-dbg9
4
vulnerability VCID-e2sp-bna5-mqb6
5
vulnerability VCID-j3mb-97k1-uuh9
6
vulnerability VCID-kcwg-hswv-2uf7
7
vulnerability VCID-kgpj-aexq-7kah
8
vulnerability VCID-me4r-1qb6-dqdf
9
vulnerability VCID-prd8-51a5-pygj
10
vulnerability VCID-srxw-jjvr-p3d5
11
vulnerability VCID-ug4a-zxkg-cbew
12
vulnerability VCID-x89d-7t1q-skcx
13
vulnerability VCID-yjqs-kszf-yka1
14
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.27
aliases CVE-2002-0843
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sn3y-mpbk-hqe8
15
url VCID-srxw-jjvr-p3d5
vulnerability_id VCID-srxw-jjvr-p3d5
summary The Apache HTTP server did not verify that a process was an Apache child process before sending it signals. A local attacker with the ability to run scripts on the HTTP server could manipulate the scoreboard and cause arbitrary processes to be terminated which could lead to a denial of service.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
1
reference_url http://bugs.gentoo.org/show_bug.cgi?id=186219
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=186219
2
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588
4
reference_url http://httpd.apache.org/security/vulnerabilities_13.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_13.html
5
reference_url http://httpd.apache.org/security/vulnerabilities_20.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_20.html
6
reference_url http://httpd.apache.org/security/vulnerabilities_22.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html
7
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
8
reference_url http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192%40redhat.com%3e
reference_id
reference_type
scores
url http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192%40redhat.com%3e
9
reference_url http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2
reference_id
reference_type
scores
url http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2
10
reference_url http://osvdb.org/38939
reference_id
reference_type
scores
url http://osvdb.org/38939
11
reference_url http://rhn.redhat.com/errata/RHSA-2007-0556.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0556.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3304.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3304.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3304
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26977
published_at 2026-04-13T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27093
published_at 2026-04-01T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27078
published_at 2026-04-11T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27034
published_at 2026-04-12T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27133
published_at 2026-04-02T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27169
published_at 2026-04-04T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26961
published_at 2026-04-07T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27029
published_at 2026-04-08T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27075
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3304
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304
15
reference_url http://secunia.com/advisories/25827
reference_id
reference_type
scores
url http://secunia.com/advisories/25827
16
reference_url http://secunia.com/advisories/25830
reference_id
reference_type
scores
url http://secunia.com/advisories/25830
17
reference_url http://secunia.com/advisories/25920
reference_id
reference_type
scores
url http://secunia.com/advisories/25920
18
reference_url http://secunia.com/advisories/26211
reference_id
reference_type
scores
url http://secunia.com/advisories/26211
19
reference_url http://secunia.com/advisories/26273
reference_id
reference_type
scores
url http://secunia.com/advisories/26273
20
reference_url http://secunia.com/advisories/26443
reference_id
reference_type
scores
url http://secunia.com/advisories/26443
21
reference_url http://secunia.com/advisories/26508
reference_id
reference_type
scores
url http://secunia.com/advisories/26508
22
reference_url http://secunia.com/advisories/26611
reference_id
reference_type
scores
url http://secunia.com/advisories/26611
23
reference_url http://secunia.com/advisories/26759
reference_id
reference_type
scores
url http://secunia.com/advisories/26759
24
reference_url http://secunia.com/advisories/26790
reference_id
reference_type
scores
url http://secunia.com/advisories/26790
25
reference_url http://secunia.com/advisories/26822
reference_id
reference_type
scores
url http://secunia.com/advisories/26822
26
reference_url http://secunia.com/advisories/26842
reference_id
reference_type
scores
url http://secunia.com/advisories/26842
27
reference_url http://secunia.com/advisories/26993
reference_id
reference_type
scores
url http://secunia.com/advisories/26993
28
reference_url http://secunia.com/advisories/27121
reference_id
reference_type
scores
url http://secunia.com/advisories/27121
29
reference_url http://secunia.com/advisories/27209
reference_id
reference_type
scores
url http://secunia.com/advisories/27209
30
reference_url http://secunia.com/advisories/27563
reference_id
reference_type
scores
url http://secunia.com/advisories/27563
31
reference_url http://secunia.com/advisories/27732
reference_id
reference_type
scores
url http://secunia.com/advisories/27732
32
reference_url http://secunia.com/advisories/28212
reference_id
reference_type
scores
url http://secunia.com/advisories/28212
33
reference_url http://secunia.com/advisories/28224
reference_id
reference_type
scores
url http://secunia.com/advisories/28224
34
reference_url http://secunia.com/advisories/28606
reference_id
reference_type
scores
url http://secunia.com/advisories/28606
35
reference_url http://security.gentoo.org/glsa/glsa-200711-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-06.xml
36
reference_url http://security.psnc.pl/files/apache_report.pdf
reference_id
reference_type
scores
url http://security.psnc.pl/files/apache_report.pdf
37
reference_url http://securityreason.com/securityalert/2814
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2814
38
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35095
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35095
39
reference_url https://issues.rpath.com/browse/RPL-1710
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1710
40
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
44
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
45
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
46
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
47
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
48
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
49
reference_url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
50
reference_url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
51
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
52
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
53
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
54
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
55
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
56
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
57
reference_url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
58
reference_url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
59
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
60
reference_url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
61
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
62
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
63
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11589
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11589
64
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
65
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
66
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
67
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm
68
reference_url http://svn.apache.org/viewvc?view=rev&revision=547987
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=rev&revision=547987
69
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
70
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984
71
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only
reference_id
reference_type
scores
url http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only
72
reference_url http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
reference_id
reference_type
scores
url http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
74
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
75
reference_url http://www.novell.com/linux/security/advisories/2007_61_apache2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_61_apache2.html
76
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
77
reference_url http://www.redhat.com/errata/RHSA-2007-0532.html
reference_id
reference_type
scores
url http://www.redhat.com/errata/RHSA-2007-0532.html
78
reference_url http://www.redhat.com/support/errata/RHSA-2007-0557.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0557.html
79
reference_url http://www.redhat.com/support/errata/RHSA-2007-0662.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0662.html
80
reference_url http://www.redhat.com/support/errata/RHSA-2008-0261.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0261.html
81
reference_url http://www.securityfocus.com/archive/1/469899/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/469899/100/0/threaded
82
reference_url http://www.securityfocus.com/archive/1/471832/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471832/100/0/threaded
83
reference_url http://www.securityfocus.com/archive/1/505990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/505990/100/0/threaded
84
reference_url http://www.securityfocus.com/bid/24215
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24215
85
reference_url http://www.securitytracker.com/id?1018304
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018304
86
reference_url http://www.trustix.org/errata/2007/0026/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0026/
87
reference_url http://www.ubuntu.com/usn/usn-499-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-499-1
88
reference_url http://www.vupen.com/english/advisories/2007/2727
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2727
89
reference_url http://www.vupen.com/english/advisories/2007/3100
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3100
90
reference_url http://www.vupen.com/english/advisories/2007/3283
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3283
91
reference_url http://www.vupen.com/english/advisories/2007/3420
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3420
92
reference_url http://www.vupen.com/english/advisories/2007/3494
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3494
93
reference_url http://www.vupen.com/english/advisories/2007/4305
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/4305
94
reference_url http://www.vupen.com/english/advisories/2008/0233
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0233
95
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245111
reference_id 245111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245111
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
104
reference_url https://httpd.apache.org/security/json/CVE-2007-3304.json
reference_id CVE-2007-3304
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-3304.json
105
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3304
reference_id CVE-2007-3304
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-3304
106
reference_url https://security.gentoo.org/glsa/200711-06
reference_id GLSA-200711-06
reference_type
scores
url https://security.gentoo.org/glsa/200711-06
107
reference_url https://access.redhat.com/errata/RHSA-2007:0532
reference_id RHSA-2007:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0532
108
reference_url https://access.redhat.com/errata/RHSA-2007:0556
reference_id RHSA-2007:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0556
109
reference_url https://access.redhat.com/errata/RHSA-2007:0557
reference_id RHSA-2007:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0557
110
reference_url https://access.redhat.com/errata/RHSA-2007:0662
reference_id RHSA-2007:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0662
111
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
112
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
113
reference_url https://usn.ubuntu.com/499-1/
reference_id USN-499-1
reference_type
scores
url https://usn.ubuntu.com/499-1/
fixed_packages
0
url pkg:apache/httpd@1.3.39
purl pkg:apache/httpd@1.3.39
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-kgpj-aexq-7kah
3
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.39
1
url pkg:apache/httpd@2.0.61
purl pkg:apache/httpd@2.0.61
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-dqkp-f1my-dbg9
9
vulnerability VCID-fn5k-e2jr-6ube
10
vulnerability VCID-g2pp-aahn-mfcd
11
vulnerability VCID-kgpj-aexq-7kah
12
vulnerability VCID-kkfv-4jd1-bqdm
13
vulnerability VCID-pdj3-4txb-vych
14
vulnerability VCID-prd8-51a5-pygj
15
vulnerability VCID-qtav-hqnd-b7fa
16
vulnerability VCID-ss79-kcpu-mqd5
17
vulnerability VCID-umuk-3n1q-3qet
18
vulnerability VCID-wycq-jwzz-q7hf
19
vulnerability VCID-y8nd-7h3r-7fh5
20
vulnerability VCID-ym93-sxb8-fkdm
21
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.61
2
url pkg:apache/httpd@2.2.6
purl pkg:apache/httpd@2.2.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-115r-fep2-fyfm
1
vulnerability VCID-1189-ej89-hybs
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2261-sdn2-zbbu
6
vulnerability VCID-2xc4-7zg9-y7fw
7
vulnerability VCID-3cea-3rkm-r7gs
8
vulnerability VCID-3kyb-4yvt-f7e1
9
vulnerability VCID-4zzy-q5zp-jkgm
10
vulnerability VCID-56kt-8bg6-zbcj
11
vulnerability VCID-5bej-9h7w-33c8
12
vulnerability VCID-5yez-d5nj-q7eq
13
vulnerability VCID-6bez-sgg8-cbbq
14
vulnerability VCID-6d43-sjqw-tbbp
15
vulnerability VCID-6pzx-1e5t-xbes
16
vulnerability VCID-7ftk-sajb-akh4
17
vulnerability VCID-7krj-8vat-3ydy
18
vulnerability VCID-7s2y-pvar-qqe3
19
vulnerability VCID-8axm-4anr-27ht
20
vulnerability VCID-8gcm-7q3n-q7bm
21
vulnerability VCID-d4rc-pnv5-6uc8
22
vulnerability VCID-dqkp-f1my-dbg9
23
vulnerability VCID-ese4-47tg-efbw
24
vulnerability VCID-fn5k-e2jr-6ube
25
vulnerability VCID-fyrq-yg2u-jkc7
26
vulnerability VCID-fysz-5mr6-fbf1
27
vulnerability VCID-g2pp-aahn-mfcd
28
vulnerability VCID-gu44-7hkr-muae
29
vulnerability VCID-hcjv-md55-3fcr
30
vulnerability VCID-jt89-ruvk-1kbj
31
vulnerability VCID-k4kb-21tp-4kc8
32
vulnerability VCID-ke1s-451y-p3cz
33
vulnerability VCID-kgpj-aexq-7kah
34
vulnerability VCID-kkfv-4jd1-bqdm
35
vulnerability VCID-kpew-rarv-83dg
36
vulnerability VCID-pc2n-ga7g-byga
37
vulnerability VCID-pdj3-4txb-vych
38
vulnerability VCID-pdtf-5zv7-2qaf
39
vulnerability VCID-pj4f-awuq-73g6
40
vulnerability VCID-prd8-51a5-pygj
41
vulnerability VCID-qayj-kts9-3fde
42
vulnerability VCID-qtav-hqnd-b7fa
43
vulnerability VCID-rhk3-ujc1-q7fj
44
vulnerability VCID-ss79-kcpu-mqd5
45
vulnerability VCID-ssvj-7g27-1ug6
46
vulnerability VCID-svyk-az69-qbfw
47
vulnerability VCID-t95h-xhtm-zbdv
48
vulnerability VCID-tbud-pwyt-aye9
49
vulnerability VCID-umuk-3n1q-3qet
50
vulnerability VCID-wycq-jwzz-q7hf
51
vulnerability VCID-y8nd-7h3r-7fh5
52
vulnerability VCID-ym93-sxb8-fkdm
53
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6
aliases CVE-2007-3304
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srxw-jjvr-p3d5
16
url VCID-ug4a-zxkg-cbew
vulnerability_id VCID-ug4a-zxkg-cbew
summary mod_digest does not properly verify the nonce of a client response by using a AuthNonce secret. This could allow a malicious user who is able to sniff network traffic to conduct a replay attack against a website using Digest protection. Note that mod_digest implements an older version of the MD5 Digest Authentication specification which is known not to work with modern browsers. This issue does not affect mod_auth_digest.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0987.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0987.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0987
reference_id
reference_type
scores
0
value 0.19648
scoring_system epss
scoring_elements 0.95422
published_at 2026-04-13T12:55:00Z
1
value 0.19648
scoring_system epss
scoring_elements 0.95387
published_at 2026-04-01T12:55:00Z
2
value 0.19648
scoring_system epss
scoring_elements 0.95396
published_at 2026-04-02T12:55:00Z
3
value 0.19648
scoring_system epss
scoring_elements 0.95402
published_at 2026-04-04T12:55:00Z
4
value 0.19648
scoring_system epss
scoring_elements 0.95406
published_at 2026-04-07T12:55:00Z
5
value 0.19648
scoring_system epss
scoring_elements 0.95412
published_at 2026-04-08T12:55:00Z
6
value 0.19648
scoring_system epss
scoring_elements 0.95415
published_at 2026-04-09T12:55:00Z
7
value 0.19648
scoring_system epss
scoring_elements 0.9542
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0987
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430529
reference_id 430529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430529
3
reference_url https://httpd.apache.org/security/json/CVE-2003-0987.json
reference_id CVE-2003-0987
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2003-0987.json
4
reference_url https://access.redhat.com/errata/RHSA-2004:600
reference_id RHSA-2004:600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:600
5
reference_url https://access.redhat.com/errata/RHSA-2004:653
reference_id RHSA-2004:653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:653
6
reference_url https://access.redhat.com/errata/RHSA-2005:816
reference_id RHSA-2005:816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:816
fixed_packages
0
url pkg:apache/httpd@1.3.31
purl pkg:apache/httpd@1.3.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
9
vulnerability VCID-x89d-7t1q-skcx
10
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.31
aliases CVE-2003-0987
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ug4a-zxkg-cbew
17
url VCID-vj4e-mzff-9qfw
vulnerability_id VCID-vj4e-mzff-9qfw
summary Apache was vulnerable to cross site scripting issues. It was shown that malicious HTML tags can be embedded in client web requests if the server or script handling the request does not carefully encode all information displayed to the user. Using these vulnerabilities attackers could, for example, obtain copies of your private cookies used to authenticate you to other sites.
references
0
reference_url http://archive.cert.uni-stuttgart.de/bugtraq/2002/12/msg00243.html
reference_id
reference_type
scores
url http://archive.cert.uni-stuttgart.de/bugtraq/2002/12/msg00243.html
1
reference_url http://archives.neohapsis.com/archives/bugtraq/2002-12/0233.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2002-12/0233.html
2
reference_url http://httpd.apache.org/info/css-security/apache_specific.html
reference_id
reference_type
scores
url http://httpd.apache.org/info/css-security/apache_specific.html
3
reference_url http://marc.info/?l=bugtraq&m=118529436424127&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=118529436424127&w=2
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2000-1205
reference_id
reference_type
scores
0
value 0.05698
scoring_system epss
scoring_elements 0.90419
published_at 2026-04-12T12:55:00Z
1
value 0.05698
scoring_system epss
scoring_elements 0.90412
published_at 2026-04-13T12:55:00Z
2
value 0.05698
scoring_system epss
scoring_elements 0.9042
published_at 2026-04-11T12:55:00Z
3
value 0.05698
scoring_system epss
scoring_elements 0.90372
published_at 2026-04-01T12:55:00Z
4
value 0.05698
scoring_system epss
scoring_elements 0.90375
published_at 2026-04-02T12:55:00Z
5
value 0.05698
scoring_system epss
scoring_elements 0.90387
published_at 2026-04-04T12:55:00Z
6
value 0.05698
scoring_system epss
scoring_elements 0.90391
published_at 2026-04-07T12:55:00Z
7
value 0.05698
scoring_system epss
scoring_elements 0.90405
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2000-1205
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/10938
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/10938
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35597
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35597
7
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*
24
reference_url https://httpd.apache.org/security/json/CVE-2000-1205.json
reference_id CVE-2000-1205
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2000-1205.json
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2000-1205
reference_id CVE-2000-1205
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2000-1205
fixed_packages
0
url pkg:apache/httpd@1.3.12
purl pkg:apache/httpd@1.3.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-4dv2-wg8e-j7f6
3
vulnerability VCID-a86d-f4nd-eqhh
4
vulnerability VCID-bu8e-hpcy-jqda
5
vulnerability VCID-d5w4-vnbd-afdj
6
vulnerability VCID-dqkp-f1my-dbg9
7
vulnerability VCID-e2sp-bna5-mqb6
8
vulnerability VCID-h8v9-m9kc-t3cu
9
vulnerability VCID-hgay-a8e4-dbht
10
vulnerability VCID-j3mb-97k1-uuh9
11
vulnerability VCID-kcwg-hswv-2uf7
12
vulnerability VCID-kgpj-aexq-7kah
13
vulnerability VCID-me4r-1qb6-dqdf
14
vulnerability VCID-nhr8-n4kg-5qg1
15
vulnerability VCID-nkgw-gs9g-ckft
16
vulnerability VCID-prd8-51a5-pygj
17
vulnerability VCID-sgfs-58ym-fygd
18
vulnerability VCID-sn3y-mpbk-hqe8
19
vulnerability VCID-srxw-jjvr-p3d5
20
vulnerability VCID-ug4a-zxkg-cbew
21
vulnerability VCID-yjqs-kszf-yka1
22
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.12
aliases CVE-2000-1205
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vj4e-mzff-9qfw
18
url VCID-yjqs-kszf-yka1
vulnerability_id VCID-yjqs-kszf-yka1
summary By using a regular expression with more than 9 captures a buffer overflow can occur in mod_alias or mod_rewrite. To exploit this an attacker would need to be able to create a carefully crafted configuration file (.htaccess or httpd.conf)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0542.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0542.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0542
reference_id
reference_type
scores
0
value 0.00523
scoring_system epss
scoring_elements 0.66912
published_at 2026-04-13T12:55:00Z
1
value 0.00523
scoring_system epss
scoring_elements 0.66838
published_at 2026-04-01T12:55:00Z
2
value 0.00523
scoring_system epss
scoring_elements 0.66876
published_at 2026-04-02T12:55:00Z
3
value 0.00523
scoring_system epss
scoring_elements 0.66902
published_at 2026-04-04T12:55:00Z
4
value 0.00523
scoring_system epss
scoring_elements 0.66875
published_at 2026-04-07T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.66924
published_at 2026-04-08T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66937
published_at 2026-04-09T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.66957
published_at 2026-04-11T12:55:00Z
8
value 0.00523
scoring_system epss
scoring_elements 0.66943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0542
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0542
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617048
reference_id 1617048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617048
4
reference_url https://httpd.apache.org/security/json/CVE-2003-0542.json
reference_id CVE-2003-0542
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2003-0542.json
5
reference_url https://access.redhat.com/errata/RHSA-2003:320
reference_id RHSA-2003:320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:320
6
reference_url https://access.redhat.com/errata/RHSA-2003:360
reference_id RHSA-2003:360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:360
7
reference_url https://access.redhat.com/errata/RHSA-2003:405
reference_id RHSA-2003:405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:405
8
reference_url https://access.redhat.com/errata/RHSA-2004:015
reference_id RHSA-2004:015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:015
9
reference_url https://access.redhat.com/errata/RHSA-2004:139
reference_id RHSA-2004:139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:139
10
reference_url https://access.redhat.com/errata/RHSA-2005:816
reference_id RHSA-2005:816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:816
fixed_packages
0
url pkg:apache/httpd@1.3.29
purl pkg:apache/httpd@1.3.29
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-3m9y-maes-5ycp
2
vulnerability VCID-9xk2-as1c-7kd2
3
vulnerability VCID-dqkp-f1my-dbg9
4
vulnerability VCID-e2sp-bna5-mqb6
5
vulnerability VCID-j3mb-97k1-uuh9
6
vulnerability VCID-kcwg-hswv-2uf7
7
vulnerability VCID-kgpj-aexq-7kah
8
vulnerability VCID-me4r-1qb6-dqdf
9
vulnerability VCID-prd8-51a5-pygj
10
vulnerability VCID-qf2e-kgxk-pkhc
11
vulnerability VCID-srxw-jjvr-p3d5
12
vulnerability VCID-ug4a-zxkg-cbew
13
vulnerability VCID-x89d-7t1q-skcx
14
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.29
1
url pkg:apache/httpd@2.0.48
purl pkg:apache/httpd@2.0.48
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-112d-h2a5-xbc4
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1nh6-77uc-xbak
3
vulnerability VCID-3cea-3rkm-r7gs
4
vulnerability VCID-3m9y-maes-5ycp
5
vulnerability VCID-3wbg-bxvj-1kca
6
vulnerability VCID-4zzy-q5zp-jkgm
7
vulnerability VCID-56kt-8bg6-zbcj
8
vulnerability VCID-5yez-d5nj-q7eq
9
vulnerability VCID-6d43-sjqw-tbbp
10
vulnerability VCID-76s2-26cr-syd1
11
vulnerability VCID-7krj-8vat-3ydy
12
vulnerability VCID-95zk-suqh-j7e7
13
vulnerability VCID-9xk2-as1c-7kd2
14
vulnerability VCID-bfvg-u6sz-6qc6
15
vulnerability VCID-d4rc-pnv5-6uc8
16
vulnerability VCID-d66x-55ub-vkfw
17
vulnerability VCID-dqkp-f1my-dbg9
18
vulnerability VCID-en6m-ye18-97hk
19
vulnerability VCID-f8n9-ampd-yyah
20
vulnerability VCID-fn5k-e2jr-6ube
21
vulnerability VCID-fq9j-uewn-q7h7
22
vulnerability VCID-g1jc-8vza-u3ad
23
vulnerability VCID-g2pp-aahn-mfcd
24
vulnerability VCID-j3mb-97k1-uuh9
25
vulnerability VCID-kcwg-hswv-2uf7
26
vulnerability VCID-kgpj-aexq-7kah
27
vulnerability VCID-kkfv-4jd1-bqdm
28
vulnerability VCID-m8uk-byje-dqey
29
vulnerability VCID-pdj3-4txb-vych
30
vulnerability VCID-prd8-51a5-pygj
31
vulnerability VCID-pufp-t6dh-xqhv
32
vulnerability VCID-qf2e-kgxk-pkhc
33
vulnerability VCID-qtav-hqnd-b7fa
34
vulnerability VCID-qufv-kta7-1feu
35
vulnerability VCID-rhhj-jhej-gfcj
36
vulnerability VCID-srxw-jjvr-p3d5
37
vulnerability VCID-ss79-kcpu-mqd5
38
vulnerability VCID-umuk-3n1q-3qet
39
vulnerability VCID-v2g6-h93b-euer
40
vulnerability VCID-vqs2-5x99-7qfd
41
vulnerability VCID-wycq-jwzz-q7hf
42
vulnerability VCID-y56e-kuj4-97f6
43
vulnerability VCID-y8nd-7h3r-7fh5
44
vulnerability VCID-ym93-sxb8-fkdm
45
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.48
aliases CVE-2003-0542
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yjqs-kszf-yka1
19
url VCID-zn9e-rcpj-yuax
vulnerability_id VCID-zn9e-rcpj-yuax
summary A buffer overflow in mod_include could allow a local user who is authorised to create server side include (SSI) files to gain the privileges of a httpd child.
references
0
reference_url http://marc.info/?l=bugtraq&m=109906660225051&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=109906660225051&w=2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0940.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0940.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0940
reference_id
reference_type
scores
0
value 0.03684
scoring_system epss
scoring_elements 0.87928
published_at 2026-04-13T12:55:00Z
1
value 0.03684
scoring_system epss
scoring_elements 0.87925
published_at 2026-04-09T12:55:00Z
2
value 0.03684
scoring_system epss
scoring_elements 0.87936
published_at 2026-04-11T12:55:00Z
3
value 0.03684
scoring_system epss
scoring_elements 0.87929
published_at 2026-04-12T12:55:00Z
4
value 0.03684
scoring_system epss
scoring_elements 0.87871
published_at 2026-04-01T12:55:00Z
5
value 0.03684
scoring_system epss
scoring_elements 0.87881
published_at 2026-04-02T12:55:00Z
6
value 0.03684
scoring_system epss
scoring_elements 0.87894
published_at 2026-04-04T12:55:00Z
7
value 0.03684
scoring_system epss
scoring_elements 0.87898
published_at 2026-04-07T12:55:00Z
8
value 0.03684
scoring_system epss
scoring_elements 0.87919
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0940
3
reference_url http://secunia.com/advisories/12898/
reference_id
reference_type
scores
url http://secunia.com/advisories/12898/
4
reference_url http://secunia.com/advisories/19073
reference_id
reference_type
scores
url http://secunia.com/advisories/19073
5
reference_url http://securitytracker.com/id?1011783
reference_id
reference_type
scores
url http://securitytracker.com/id?1011783
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17785
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17785
7
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
14
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
15
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
16
reference_url http://www.apacheweek.com/features/security-13
reference_id
reference_type
scores
url http://www.apacheweek.com/features/security-13
17
reference_url http://www.debian.org/security/2004/dsa-594
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-594
18
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:134
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:134
19
reference_url http://www.redhat.com/support/errata/RHSA-2004-600.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2004-600.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2005-816.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-816.html
21
reference_url http://www.securityfocus.com/bid/11471
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11471
22
reference_url http://www.vupen.com/english/advisories/2006/0789
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0789
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430526
reference_id 430526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430526
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
45
reference_url https://httpd.apache.org/security/json/CVE-2004-0940.json
reference_id CVE-2004-0940
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0940.json
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0940
reference_id CVE-2004-0940
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2004-0940
47
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/24694.c
reference_id CVE-2004-0940;OSVDB-12881
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/24694.c
48
reference_url https://www.securityfocus.com/bid/11471/info
reference_id CVE-2004-0940;OSVDB-12881
reference_type exploit
scores
url https://www.securityfocus.com/bid/11471/info
49
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/587.c
reference_id OSVDB-11003;CVE-2004-0940
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/587.c
50
reference_url https://access.redhat.com/errata/RHSA-2004:600
reference_id RHSA-2004:600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:600
51
reference_url https://access.redhat.com/errata/RHSA-2004:653
reference_id RHSA-2004:653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:653
52
reference_url https://access.redhat.com/errata/RHSA-2005:816
reference_id RHSA-2005:816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:816
fixed_packages
0
url pkg:apache/httpd@1.3.33
purl pkg:apache/httpd@1.3.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.33
aliases CVE-2004-0940
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn9e-rcpj-yuax
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.4