Lookup for vulnerable packages by Package URL.

Purlpkg:apache/httpd@1.3.31
Typeapache
Namespace
Namehttpd
Version1.3.31
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.0.65
Latest_non_vulnerable_version2.4.54
Affected_by_vulnerabilities
0
url VCID-123w-f3zc-37d9
vulnerability_id VCID-123w-f3zc-37d9
summary An incorrect conversion between numeric types flaw was found in the mod_proxy module which affects some 64-bit architecture systems. A malicious HTTP server to which requests are being proxied could use this flaw to trigger a heap buffer overflow in an httpd child process via a carefully crafted response.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0010
reference_id
reference_type
scores
0
value 0.47445
scoring_system epss
scoring_elements 0.97698
published_at 2026-04-13T12:55:00Z
1
value 0.47445
scoring_system epss
scoring_elements 0.97677
published_at 2026-04-01T12:55:00Z
2
value 0.47445
scoring_system epss
scoring_elements 0.97683
published_at 2026-04-02T12:55:00Z
3
value 0.47445
scoring_system epss
scoring_elements 0.97684
published_at 2026-04-04T12:55:00Z
4
value 0.47445
scoring_system epss
scoring_elements 0.97685
published_at 2026-04-07T12:55:00Z
5
value 0.47445
scoring_system epss
scoring_elements 0.97689
published_at 2026-04-08T12:55:00Z
6
value 0.47445
scoring_system epss
scoring_elements 0.97692
published_at 2026-04-09T12:55:00Z
7
value 0.47445
scoring_system epss
scoring_elements 0.97695
published_at 2026-04-11T12:55:00Z
8
value 0.47445
scoring_system epss
scoring_elements 0.97697
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0010
1
reference_url https://httpd.apache.org/security/json/CVE-2010-0010.json
reference_id CVE-2010-0010
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2010-0010.json
fixed_packages
0
url pkg:apache/httpd@1.3.42
purl pkg:apache/httpd@1.3.42
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.42
aliases CVE-2010-0010
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-123w-f3zc-37d9
1
url VCID-dqkp-f1my-dbg9
vulnerability_id VCID-dqkp-f1my-dbg9
summary A flaw was found in the mod_imagemap module. On sites where mod_imagemap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5000.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5000
reference_id
reference_type
scores
0
value 0.7731
scoring_system epss
scoring_elements 0.98975
published_at 2026-04-07T12:55:00Z
1
value 0.7731
scoring_system epss
scoring_elements 0.98968
published_at 2026-04-01T12:55:00Z
2
value 0.7731
scoring_system epss
scoring_elements 0.9897
published_at 2026-04-02T12:55:00Z
3
value 0.7731
scoring_system epss
scoring_elements 0.98972
published_at 2026-04-04T12:55:00Z
4
value 0.78073
scoring_system epss
scoring_elements 0.99015
published_at 2026-04-13T12:55:00Z
5
value 0.78073
scoring_system epss
scoring_elements 0.99012
published_at 2026-04-09T12:55:00Z
6
value 0.78073
scoring_system epss
scoring_elements 0.99013
published_at 2026-04-11T12:55:00Z
7
value 0.78073
scoring_system epss
scoring_elements 0.99014
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=419931
reference_id 419931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=419931
4
reference_url https://httpd.apache.org/security/json/CVE-2007-5000.json
reference_id CVE-2007-5000
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-5000.json
5
reference_url https://access.redhat.com/errata/RHSA-2008:0004
reference_id RHSA-2008:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0004
6
reference_url https://access.redhat.com/errata/RHSA-2008:0005
reference_id RHSA-2008:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0005
7
reference_url https://access.redhat.com/errata/RHSA-2008:0006
reference_id RHSA-2008:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0006
8
reference_url https://access.redhat.com/errata/RHSA-2008:0007
reference_id RHSA-2008:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0007
9
reference_url https://access.redhat.com/errata/RHSA-2008:0008
reference_id RHSA-2008:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0008
10
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
11
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
12
reference_url https://usn.ubuntu.com/575-1/
reference_id USN-575-1
reference_type
scores
url https://usn.ubuntu.com/575-1/
fixed_packages
0
url pkg:apache/httpd@1.3.41
purl pkg:apache/httpd@1.3.41
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41
1
url pkg:apache/httpd@2.0.63
purl pkg:apache/httpd@2.0.63
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-fn5k-e2jr-6ube
9
vulnerability VCID-g2pp-aahn-mfcd
10
vulnerability VCID-kkfv-4jd1-bqdm
11
vulnerability VCID-pdj3-4txb-vych
12
vulnerability VCID-prd8-51a5-pygj
13
vulnerability VCID-qtav-hqnd-b7fa
14
vulnerability VCID-umuk-3n1q-3qet
15
vulnerability VCID-wycq-jwzz-q7hf
16
vulnerability VCID-y8nd-7h3r-7fh5
17
vulnerability VCID-ym93-sxb8-fkdm
18
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.63
2
url pkg:apache/httpd@2.2.8
purl pkg:apache/httpd@2.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-3cea-3rkm-r7gs
6
vulnerability VCID-3kyb-4yvt-f7e1
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5yez-d5nj-q7eq
11
vulnerability VCID-6bez-sgg8-cbbq
12
vulnerability VCID-6d43-sjqw-tbbp
13
vulnerability VCID-6pzx-1e5t-xbes
14
vulnerability VCID-7ftk-sajb-akh4
15
vulnerability VCID-7krj-8vat-3ydy
16
vulnerability VCID-7s2y-pvar-qqe3
17
vulnerability VCID-8axm-4anr-27ht
18
vulnerability VCID-8gcm-7q3n-q7bm
19
vulnerability VCID-d4rc-pnv5-6uc8
20
vulnerability VCID-ese4-47tg-efbw
21
vulnerability VCID-fn5k-e2jr-6ube
22
vulnerability VCID-fyrq-yg2u-jkc7
23
vulnerability VCID-fysz-5mr6-fbf1
24
vulnerability VCID-g2pp-aahn-mfcd
25
vulnerability VCID-gu44-7hkr-muae
26
vulnerability VCID-hcjv-md55-3fcr
27
vulnerability VCID-jt89-ruvk-1kbj
28
vulnerability VCID-k4kb-21tp-4kc8
29
vulnerability VCID-ke1s-451y-p3cz
30
vulnerability VCID-kkfv-4jd1-bqdm
31
vulnerability VCID-kpew-rarv-83dg
32
vulnerability VCID-pc2n-ga7g-byga
33
vulnerability VCID-pdj3-4txb-vych
34
vulnerability VCID-pdtf-5zv7-2qaf
35
vulnerability VCID-pj4f-awuq-73g6
36
vulnerability VCID-prd8-51a5-pygj
37
vulnerability VCID-qayj-kts9-3fde
38
vulnerability VCID-qtav-hqnd-b7fa
39
vulnerability VCID-rhk3-ujc1-q7fj
40
vulnerability VCID-ssvj-7g27-1ug6
41
vulnerability VCID-svyk-az69-qbfw
42
vulnerability VCID-t95h-xhtm-zbdv
43
vulnerability VCID-tbud-pwyt-aye9
44
vulnerability VCID-umuk-3n1q-3qet
45
vulnerability VCID-wycq-jwzz-q7hf
46
vulnerability VCID-y8nd-7h3r-7fh5
47
vulnerability VCID-ym93-sxb8-fkdm
48
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8
aliases CVE-2007-5000
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqkp-f1my-dbg9
2
url VCID-j3mb-97k1-uuh9
vulnerability_id VCID-j3mb-97k1-uuh9
summary A flaw was found in the mod_status module. On sites where the server-status page is publicly accessible and ExtendedStatus is enabled this could lead to a cross-site scripting attack. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=186219
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=186219
1
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
3
reference_url http://httpd.apache.org/security/vulnerabilities_13.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_13.html
4
reference_url http://httpd.apache.org/security/vulnerabilities_20.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_20.html
5
reference_url http://httpd.apache.org/security/vulnerabilities_22.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html
6
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
7
reference_url http://osvdb.org/37052
reference_id
reference_type
scores
url http://osvdb.org/37052
8
reference_url http://rhn.redhat.com/errata/RHSA-2007-0534.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0534.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2007-0556.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0556.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5752.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5752.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-5752
reference_id
reference_type
scores
0
value 0.18368
scoring_system epss
scoring_elements 0.95226
published_at 2026-04-13T12:55:00Z
1
value 0.18368
scoring_system epss
scoring_elements 0.95189
published_at 2026-04-01T12:55:00Z
2
value 0.18368
scoring_system epss
scoring_elements 0.95218
published_at 2026-04-09T12:55:00Z
3
value 0.18368
scoring_system epss
scoring_elements 0.95223
published_at 2026-04-12T12:55:00Z
4
value 0.18368
scoring_system epss
scoring_elements 0.95201
published_at 2026-04-02T12:55:00Z
5
value 0.18368
scoring_system epss
scoring_elements 0.95203
published_at 2026-04-04T12:55:00Z
6
value 0.18368
scoring_system epss
scoring_elements 0.95206
published_at 2026-04-07T12:55:00Z
7
value 0.18368
scoring_system epss
scoring_elements 0.95214
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-5752
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752
13
reference_url http://secunia.com/advisories/25827
reference_id
reference_type
scores
url http://secunia.com/advisories/25827
14
reference_url http://secunia.com/advisories/25830
reference_id
reference_type
scores
url http://secunia.com/advisories/25830
15
reference_url http://secunia.com/advisories/25873
reference_id
reference_type
scores
url http://secunia.com/advisories/25873
16
reference_url http://secunia.com/advisories/25920
reference_id
reference_type
scores
url http://secunia.com/advisories/25920
17
reference_url http://secunia.com/advisories/26273
reference_id
reference_type
scores
url http://secunia.com/advisories/26273
18
reference_url http://secunia.com/advisories/26443
reference_id
reference_type
scores
url http://secunia.com/advisories/26443
19
reference_url http://secunia.com/advisories/26458
reference_id
reference_type
scores
url http://secunia.com/advisories/26458
20
reference_url http://secunia.com/advisories/26508
reference_id
reference_type
scores
url http://secunia.com/advisories/26508
21
reference_url http://secunia.com/advisories/26822
reference_id
reference_type
scores
url http://secunia.com/advisories/26822
22
reference_url http://secunia.com/advisories/26842
reference_id
reference_type
scores
url http://secunia.com/advisories/26842
23
reference_url http://secunia.com/advisories/26993
reference_id
reference_type
scores
url http://secunia.com/advisories/26993
24
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
25
reference_url http://secunia.com/advisories/27563
reference_id
reference_type
scores
url http://secunia.com/advisories/27563
26
reference_url http://secunia.com/advisories/27732
reference_id
reference_type
scores
url http://secunia.com/advisories/27732
27
reference_url http://secunia.com/advisories/28212
reference_id
reference_type
scores
url http://secunia.com/advisories/28212
28
reference_url http://secunia.com/advisories/28224
reference_id
reference_type
scores
url http://secunia.com/advisories/28224
29
reference_url http://secunia.com/advisories/28606
reference_id
reference_type
scores
url http://secunia.com/advisories/28606
30
reference_url http://security.gentoo.org/glsa/glsa-200711-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-06.xml
31
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35097
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35097
32
reference_url https://issues.rpath.com/browse/RPL-1500
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1500
33
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
37
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
38
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
39
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
40
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
44
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
45
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
46
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
47
reference_url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
48
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
49
reference_url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
50
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
51
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
52
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154
53
reference_url https://rhn.redhat.com/errata/RHSA-2007-0533.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2007-0533.html
54
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
55
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
56
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
57
reference_url http://svn.apache.org/viewvc?view=rev&revision=549159
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=rev&revision=549159
58
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
59
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only
reference_id
reference_type
scores
url http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only
60
reference_url http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
reference_id
reference_type
scores
url http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
61
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
62
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:141
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:141
63
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
64
reference_url http://www.novell.com/linux/security/advisories/2007_61_apache2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_61_apache2.html
65
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
66
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
67
reference_url http://www.redhat.com/support/errata/RHSA-2007-0532.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0532.html
68
reference_url http://www.redhat.com/support/errata/RHSA-2007-0557.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0557.html
69
reference_url http://www.redhat.com/support/errata/RHSA-2008-0261.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0261.html
70
reference_url http://www.securityfocus.com/archive/1/505990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/505990/100/0/threaded
71
reference_url http://www.securityfocus.com/bid/24645
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24645
72
reference_url http://www.securitytracker.com/id?1018302
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018302
73
reference_url http://www.trustix.org/errata/2007/0026/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0026/
74
reference_url http://www.ubuntu.com/usn/usn-499-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-499-1
75
reference_url http://www.vupen.com/english/advisories/2007/2727
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2727
76
reference_url http://www.vupen.com/english/advisories/2007/3283
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3283
77
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
78
reference_url http://www.vupen.com/english/advisories/2007/4305
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/4305
79
reference_url http://www.vupen.com/english/advisories/2008/0233
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0233
80
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245112
reference_id 245112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245112
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
96
reference_url https://httpd.apache.org/security/json/CVE-2006-5752.json
reference_id CVE-2006-5752
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2006-5752.json
97
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-5752
reference_id CVE-2006-5752
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2006-5752
98
reference_url https://security.gentoo.org/glsa/200711-06
reference_id GLSA-200711-06
reference_type
scores
url https://security.gentoo.org/glsa/200711-06
99
reference_url https://access.redhat.com/errata/RHSA-2007:0532
reference_id RHSA-2007:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0532
100
reference_url https://access.redhat.com/errata/RHSA-2007:0533
reference_id RHSA-2007:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0533
101
reference_url https://access.redhat.com/errata/RHSA-2007:0534
reference_id RHSA-2007:0534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0534
102
reference_url https://access.redhat.com/errata/RHSA-2007:0556
reference_id RHSA-2007:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0556
103
reference_url https://access.redhat.com/errata/RHSA-2007:0557
reference_id RHSA-2007:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0557
104
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
105
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
106
reference_url https://usn.ubuntu.com/499-1/
reference_id USN-499-1
reference_type
scores
url https://usn.ubuntu.com/499-1/
fixed_packages
0
url pkg:apache/httpd@1.3.39
purl pkg:apache/httpd@1.3.39
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-kgpj-aexq-7kah
3
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.39
1
url pkg:apache/httpd@2.0.61
purl pkg:apache/httpd@2.0.61
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-dqkp-f1my-dbg9
9
vulnerability VCID-fn5k-e2jr-6ube
10
vulnerability VCID-g2pp-aahn-mfcd
11
vulnerability VCID-kgpj-aexq-7kah
12
vulnerability VCID-kkfv-4jd1-bqdm
13
vulnerability VCID-pdj3-4txb-vych
14
vulnerability VCID-prd8-51a5-pygj
15
vulnerability VCID-qtav-hqnd-b7fa
16
vulnerability VCID-ss79-kcpu-mqd5
17
vulnerability VCID-umuk-3n1q-3qet
18
vulnerability VCID-wycq-jwzz-q7hf
19
vulnerability VCID-y8nd-7h3r-7fh5
20
vulnerability VCID-ym93-sxb8-fkdm
21
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.61
2
url pkg:apache/httpd@2.2.6
purl pkg:apache/httpd@2.2.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-115r-fep2-fyfm
1
vulnerability VCID-1189-ej89-hybs
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2261-sdn2-zbbu
6
vulnerability VCID-2xc4-7zg9-y7fw
7
vulnerability VCID-3cea-3rkm-r7gs
8
vulnerability VCID-3kyb-4yvt-f7e1
9
vulnerability VCID-4zzy-q5zp-jkgm
10
vulnerability VCID-56kt-8bg6-zbcj
11
vulnerability VCID-5bej-9h7w-33c8
12
vulnerability VCID-5yez-d5nj-q7eq
13
vulnerability VCID-6bez-sgg8-cbbq
14
vulnerability VCID-6d43-sjqw-tbbp
15
vulnerability VCID-6pzx-1e5t-xbes
16
vulnerability VCID-7ftk-sajb-akh4
17
vulnerability VCID-7krj-8vat-3ydy
18
vulnerability VCID-7s2y-pvar-qqe3
19
vulnerability VCID-8axm-4anr-27ht
20
vulnerability VCID-8gcm-7q3n-q7bm
21
vulnerability VCID-d4rc-pnv5-6uc8
22
vulnerability VCID-dqkp-f1my-dbg9
23
vulnerability VCID-ese4-47tg-efbw
24
vulnerability VCID-fn5k-e2jr-6ube
25
vulnerability VCID-fyrq-yg2u-jkc7
26
vulnerability VCID-fysz-5mr6-fbf1
27
vulnerability VCID-g2pp-aahn-mfcd
28
vulnerability VCID-gu44-7hkr-muae
29
vulnerability VCID-hcjv-md55-3fcr
30
vulnerability VCID-jt89-ruvk-1kbj
31
vulnerability VCID-k4kb-21tp-4kc8
32
vulnerability VCID-ke1s-451y-p3cz
33
vulnerability VCID-kgpj-aexq-7kah
34
vulnerability VCID-kkfv-4jd1-bqdm
35
vulnerability VCID-kpew-rarv-83dg
36
vulnerability VCID-pc2n-ga7g-byga
37
vulnerability VCID-pdj3-4txb-vych
38
vulnerability VCID-pdtf-5zv7-2qaf
39
vulnerability VCID-pj4f-awuq-73g6
40
vulnerability VCID-prd8-51a5-pygj
41
vulnerability VCID-qayj-kts9-3fde
42
vulnerability VCID-qtav-hqnd-b7fa
43
vulnerability VCID-rhk3-ujc1-q7fj
44
vulnerability VCID-ss79-kcpu-mqd5
45
vulnerability VCID-ssvj-7g27-1ug6
46
vulnerability VCID-svyk-az69-qbfw
47
vulnerability VCID-t95h-xhtm-zbdv
48
vulnerability VCID-tbud-pwyt-aye9
49
vulnerability VCID-umuk-3n1q-3qet
50
vulnerability VCID-wycq-jwzz-q7hf
51
vulnerability VCID-y8nd-7h3r-7fh5
52
vulnerability VCID-ym93-sxb8-fkdm
53
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6
aliases CVE-2006-5752
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j3mb-97k1-uuh9
3
url VCID-kcwg-hswv-2uf7
vulnerability_id VCID-kcwg-hswv-2uf7
summary A flaw in mod_imap when using the Referer directive with image maps. In certain site configurations a remote attacker could perform a cross-site scripting attack if a victim can be forced to visit a malicious URL using certain web browsers.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
1
reference_url http://docs.info.apple.com/article.html?artnum=307562
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=307562
2
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449
3
reference_url http://issues.apache.org/bugzilla/show_bug.cgi?id=37874
reference_id
reference_type
scores
url http://issues.apache.org/bugzilla/show_bug.cgi?id=37874
4
reference_url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
5
reference_url http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
6
reference_url http://lists.suse.com/archive/suse-security-announce/2007-May/0005.html
reference_id
reference_type
scores
url http://lists.suse.com/archive/suse-security-announce/2007-May/0005.html
7
reference_url http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
reference_id
reference_type
scores
url http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
8
reference_url http://marc.info/?l=bugtraq&m=130497311408250&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=130497311408250&w=2
9
reference_url http://rhn.redhat.com/errata/RHSA-2006-0159.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0159.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2006-0692.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0692.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3352.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3352
reference_id
reference_type
scores
0
value 0.25577
scoring_system epss
scoring_elements 0.96231
published_at 2026-04-13T12:55:00Z
1
value 0.25577
scoring_system epss
scoring_elements 0.96193
published_at 2026-04-01T12:55:00Z
2
value 0.25577
scoring_system epss
scoring_elements 0.9623
published_at 2026-04-11T12:55:00Z
3
value 0.25577
scoring_system epss
scoring_elements 0.96229
published_at 2026-04-12T12:55:00Z
4
value 0.25577
scoring_system epss
scoring_elements 0.96201
published_at 2026-04-02T12:55:00Z
5
value 0.25577
scoring_system epss
scoring_elements 0.96208
published_at 2026-04-04T12:55:00Z
6
value 0.25577
scoring_system epss
scoring_elements 0.96213
published_at 2026-04-07T12:55:00Z
7
value 0.25577
scoring_system epss
scoring_elements 0.96222
published_at 2026-04-08T12:55:00Z
8
value 0.25577
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3352
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352
14
reference_url http://secunia.com/advisories/17319
reference_id
reference_type
scores
url http://secunia.com/advisories/17319
15
reference_url http://secunia.com/advisories/18008
reference_id
reference_type
scores
url http://secunia.com/advisories/18008
16
reference_url http://secunia.com/advisories/18333
reference_id
reference_type
scores
url http://secunia.com/advisories/18333
17
reference_url http://secunia.com/advisories/18339
reference_id
reference_type
scores
url http://secunia.com/advisories/18339
18
reference_url http://secunia.com/advisories/18340
reference_id
reference_type
scores
url http://secunia.com/advisories/18340
19
reference_url http://secunia.com/advisories/18429
reference_id
reference_type
scores
url http://secunia.com/advisories/18429
20
reference_url http://secunia.com/advisories/18517
reference_id
reference_type
scores
url http://secunia.com/advisories/18517
21
reference_url http://secunia.com/advisories/18526
reference_id
reference_type
scores
url http://secunia.com/advisories/18526
22
reference_url http://secunia.com/advisories/18585
reference_id
reference_type
scores
url http://secunia.com/advisories/18585
23
reference_url http://secunia.com/advisories/18743
reference_id
reference_type
scores
url http://secunia.com/advisories/18743
24
reference_url http://secunia.com/advisories/19012
reference_id
reference_type
scores
url http://secunia.com/advisories/19012
25
reference_url http://secunia.com/advisories/20046
reference_id
reference_type
scores
url http://secunia.com/advisories/20046
26
reference_url http://secunia.com/advisories/20670
reference_id
reference_type
scores
url http://secunia.com/advisories/20670
27
reference_url http://secunia.com/advisories/21744
reference_id
reference_type
scores
url http://secunia.com/advisories/21744
28
reference_url http://secunia.com/advisories/22140
reference_id
reference_type
scores
url http://secunia.com/advisories/22140
29
reference_url http://secunia.com/advisories/22368
reference_id
reference_type
scores
url http://secunia.com/advisories/22368
30
reference_url http://secunia.com/advisories/22388
reference_id
reference_type
scores
url http://secunia.com/advisories/22388
31
reference_url http://secunia.com/advisories/22669
reference_id
reference_type
scores
url http://secunia.com/advisories/22669
32
reference_url http://secunia.com/advisories/23260
reference_id
reference_type
scores
url http://secunia.com/advisories/23260
33
reference_url http://secunia.com/advisories/25239
reference_id
reference_type
scores
url http://secunia.com/advisories/25239
34
reference_url http://secunia.com/advisories/29420
reference_id
reference_type
scores
url http://secunia.com/advisories/29420
35
reference_url http://secunia.com/advisories/29849
reference_id
reference_type
scores
url http://secunia.com/advisories/29849
36
reference_url http://secunia.com/advisories/30430
reference_id
reference_type
scores
url http://secunia.com/advisories/30430
37
reference_url http://securitytracker.com/id?1015344
reference_id
reference_type
scores
url http://securitytracker.com/id?1015344
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.470158
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.470158
39
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.685483
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.685483
40
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
44
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
45
reference_url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
46
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
47
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
48
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
49
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
50
reference_url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
51
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
52
reference_url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
53
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
54
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10480
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10480
55
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1
56
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1
57
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only
reference_id
reference_type
scores
url http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only
58
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PK25355&apar=only
reference_id
reference_type
scores
url http://www-1.ibm.com/support/search.wss?rs=0&q=PK25355&apar=only
59
reference_url http://www.debian.org/security/2006/dsa-1167
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1167
60
reference_url http://www.gentoo.org/security/en/glsa/glsa-200602-03.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200602-03.xml
61
reference_url http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007
reference_id
reference_type
scores
url http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007
62
reference_url http://www.novell.com/linux/security/advisories/2006_43_apache.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_43_apache.html
63
reference_url http://www.openpkg.org/security/OpenPKG-SA-2005.029-apache.txt
reference_id
reference_type
scores
url http://www.openpkg.org/security/OpenPKG-SA-2005.029-apache.txt
64
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
65
reference_url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00060.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00060.html
66
reference_url http://www.redhat.com/support/errata/RHSA-2006-0158.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0158.html
67
reference_url http://www.securityfocus.com/archive/1/425399/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/425399/100/0/threaded
68
reference_url http://www.securityfocus.com/archive/1/445206/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/445206/100/0/threaded
69
reference_url http://www.securityfocus.com/archive/1/450315/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/450315/100/0/threaded
70
reference_url http://www.securityfocus.com/archive/1/450321/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/450321/100/0/threaded
71
reference_url http://www.securityfocus.com/bid/15834
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15834
72
reference_url http://www.trustix.org/errata/2005/0074/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0074/
73
reference_url http://www.ubuntulinux.org/usn/usn-241-1
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-241-1
74
reference_url http://www.us-cert.gov/cas/techalerts/TA08-150A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA08-150A.html
75
reference_url http://www.vupen.com/english/advisories/2005/2870
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2870
76
reference_url http://www.vupen.com/english/advisories/2006/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/2423
77
reference_url http://www.vupen.com/english/advisories/2006/3995
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/3995
78
reference_url http://www.vupen.com/english/advisories/2006/4015
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4015
79
reference_url http://www.vupen.com/english/advisories/2006/4300
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4300
80
reference_url http://www.vupen.com/english/advisories/2006/4868
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4868
81
reference_url http://www.vupen.com/english/advisories/2008/0924/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0924/references
82
reference_url http://www.vupen.com/english/advisories/2008/1246/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1246/references
83
reference_url http://www.vupen.com/english/advisories/2008/1697
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1697
84
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343467
reference_id 343467
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343467
85
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430524
reference_id 430524
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430524
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
88
reference_url https://httpd.apache.org/security/json/CVE-2005-3352.json
reference_id CVE-2005-3352
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2005-3352.json
89
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3352
reference_id CVE-2005-3352
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-3352
90
reference_url https://security.gentoo.org/glsa/200602-03
reference_id GLSA-200602-03
reference_type
scores
url https://security.gentoo.org/glsa/200602-03
91
reference_url https://access.redhat.com/errata/RHSA-2005:882
reference_id RHSA-2005:882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:882
92
reference_url https://access.redhat.com/errata/RHSA-2006:0158
reference_id RHSA-2006:0158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0158
93
reference_url https://access.redhat.com/errata/RHSA-2006:0159
reference_id RHSA-2006:0159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0159
94
reference_url https://access.redhat.com/errata/RHSA-2006:0692
reference_id RHSA-2006:0692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0692
95
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
96
reference_url https://usn.ubuntu.com/241-1/
reference_id USN-241-1
reference_type
scores
url https://usn.ubuntu.com/241-1/
fixed_packages
0
url pkg:apache/httpd@1.3.35
purl pkg:apache/httpd@1.3.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kgpj-aexq-7kah
4
vulnerability VCID-prd8-51a5-pygj
5
vulnerability VCID-qf2e-kgxk-pkhc
6
vulnerability VCID-srxw-jjvr-p3d5
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.35
1
url pkg:apache/httpd@2.0.58
purl pkg:apache/httpd@2.0.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-1nh6-77uc-xbak
2
vulnerability VCID-3cea-3rkm-r7gs
3
vulnerability VCID-4zzy-q5zp-jkgm
4
vulnerability VCID-56kt-8bg6-zbcj
5
vulnerability VCID-5yez-d5nj-q7eq
6
vulnerability VCID-6d43-sjqw-tbbp
7
vulnerability VCID-7krj-8vat-3ydy
8
vulnerability VCID-95zk-suqh-j7e7
9
vulnerability VCID-d4rc-pnv5-6uc8
10
vulnerability VCID-dqkp-f1my-dbg9
11
vulnerability VCID-fn5k-e2jr-6ube
12
vulnerability VCID-g2pp-aahn-mfcd
13
vulnerability VCID-j3mb-97k1-uuh9
14
vulnerability VCID-kgpj-aexq-7kah
15
vulnerability VCID-kkfv-4jd1-bqdm
16
vulnerability VCID-pdj3-4txb-vych
17
vulnerability VCID-prd8-51a5-pygj
18
vulnerability VCID-qf2e-kgxk-pkhc
19
vulnerability VCID-qtav-hqnd-b7fa
20
vulnerability VCID-srxw-jjvr-p3d5
21
vulnerability VCID-ss79-kcpu-mqd5
22
vulnerability VCID-umuk-3n1q-3qet
23
vulnerability VCID-wycq-jwzz-q7hf
24
vulnerability VCID-y8nd-7h3r-7fh5
25
vulnerability VCID-ym93-sxb8-fkdm
26
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.58
2
url pkg:apache/httpd@2.2.2
purl pkg:apache/httpd@2.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-115r-fep2-fyfm
1
vulnerability VCID-1189-ej89-hybs
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1nh6-77uc-xbak
5
vulnerability VCID-1zk6-7wv2-ukcz
6
vulnerability VCID-2261-sdn2-zbbu
7
vulnerability VCID-2xc4-7zg9-y7fw
8
vulnerability VCID-3cea-3rkm-r7gs
9
vulnerability VCID-3kyb-4yvt-f7e1
10
vulnerability VCID-4zzy-q5zp-jkgm
11
vulnerability VCID-56kt-8bg6-zbcj
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5yez-d5nj-q7eq
14
vulnerability VCID-6bez-sgg8-cbbq
15
vulnerability VCID-6d43-sjqw-tbbp
16
vulnerability VCID-6pzx-1e5t-xbes
17
vulnerability VCID-7ftk-sajb-akh4
18
vulnerability VCID-7krj-8vat-3ydy
19
vulnerability VCID-7s2y-pvar-qqe3
20
vulnerability VCID-8axm-4anr-27ht
21
vulnerability VCID-8gcm-7q3n-q7bm
22
vulnerability VCID-95zk-suqh-j7e7
23
vulnerability VCID-d4rc-pnv5-6uc8
24
vulnerability VCID-dqkp-f1my-dbg9
25
vulnerability VCID-ese4-47tg-efbw
26
vulnerability VCID-fn5k-e2jr-6ube
27
vulnerability VCID-fyrq-yg2u-jkc7
28
vulnerability VCID-fysz-5mr6-fbf1
29
vulnerability VCID-g2pp-aahn-mfcd
30
vulnerability VCID-gu44-7hkr-muae
31
vulnerability VCID-hcjv-md55-3fcr
32
vulnerability VCID-j3mb-97k1-uuh9
33
vulnerability VCID-jt89-ruvk-1kbj
34
vulnerability VCID-k4kb-21tp-4kc8
35
vulnerability VCID-ke1s-451y-p3cz
36
vulnerability VCID-kgpj-aexq-7kah
37
vulnerability VCID-kkfv-4jd1-bqdm
38
vulnerability VCID-kpew-rarv-83dg
39
vulnerability VCID-pc2n-ga7g-byga
40
vulnerability VCID-pdj3-4txb-vych
41
vulnerability VCID-pdtf-5zv7-2qaf
42
vulnerability VCID-pj4f-awuq-73g6
43
vulnerability VCID-prd8-51a5-pygj
44
vulnerability VCID-qayj-kts9-3fde
45
vulnerability VCID-qf2e-kgxk-pkhc
46
vulnerability VCID-qtav-hqnd-b7fa
47
vulnerability VCID-rhk3-ujc1-q7fj
48
vulnerability VCID-srxw-jjvr-p3d5
49
vulnerability VCID-ss79-kcpu-mqd5
50
vulnerability VCID-ssvj-7g27-1ug6
51
vulnerability VCID-svyk-az69-qbfw
52
vulnerability VCID-t95h-xhtm-zbdv
53
vulnerability VCID-tbud-pwyt-aye9
54
vulnerability VCID-umuk-3n1q-3qet
55
vulnerability VCID-wycq-jwzz-q7hf
56
vulnerability VCID-y8nd-7h3r-7fh5
57
vulnerability VCID-ym93-sxb8-fkdm
58
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.2
aliases CVE-2005-3352
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kcwg-hswv-2uf7
4
url VCID-kgpj-aexq-7kah
vulnerability_id VCID-kgpj-aexq-7kah
summary A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6388.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6388
reference_id
reference_type
scores
0
value 0.85047
scoring_system epss
scoring_elements 0.99353
published_at 2026-04-13T12:55:00Z
1
value 0.85047
scoring_system epss
scoring_elements 0.99344
published_at 2026-04-01T12:55:00Z
2
value 0.85047
scoring_system epss
scoring_elements 0.99345
published_at 2026-04-02T12:55:00Z
3
value 0.85047
scoring_system epss
scoring_elements 0.99347
published_at 2026-04-04T12:55:00Z
4
value 0.85047
scoring_system epss
scoring_elements 0.99348
published_at 2026-04-07T12:55:00Z
5
value 0.85047
scoring_system epss
scoring_elements 0.9935
published_at 2026-04-09T12:55:00Z
6
value 0.85047
scoring_system epss
scoring_elements 0.99352
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=427228
reference_id 427228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=427228
4
reference_url https://httpd.apache.org/security/json/CVE-2007-6388.json
reference_id CVE-2007-6388
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-6388.json
5
reference_url https://access.redhat.com/errata/RHSA-2008:0004
reference_id RHSA-2008:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0004
6
reference_url https://access.redhat.com/errata/RHSA-2008:0005
reference_id RHSA-2008:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0005
7
reference_url https://access.redhat.com/errata/RHSA-2008:0006
reference_id RHSA-2008:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0006
8
reference_url https://access.redhat.com/errata/RHSA-2008:0007
reference_id RHSA-2008:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0007
9
reference_url https://access.redhat.com/errata/RHSA-2008:0008
reference_id RHSA-2008:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0008
10
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
11
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
12
reference_url https://usn.ubuntu.com/575-1/
reference_id USN-575-1
reference_type
scores
url https://usn.ubuntu.com/575-1/
fixed_packages
0
url pkg:apache/httpd@1.3.41
purl pkg:apache/httpd@1.3.41
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41
1
url pkg:apache/httpd@2.0.63
purl pkg:apache/httpd@2.0.63
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-fn5k-e2jr-6ube
9
vulnerability VCID-g2pp-aahn-mfcd
10
vulnerability VCID-kkfv-4jd1-bqdm
11
vulnerability VCID-pdj3-4txb-vych
12
vulnerability VCID-prd8-51a5-pygj
13
vulnerability VCID-qtav-hqnd-b7fa
14
vulnerability VCID-umuk-3n1q-3qet
15
vulnerability VCID-wycq-jwzz-q7hf
16
vulnerability VCID-y8nd-7h3r-7fh5
17
vulnerability VCID-ym93-sxb8-fkdm
18
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.63
2
url pkg:apache/httpd@2.2.8
purl pkg:apache/httpd@2.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-3cea-3rkm-r7gs
6
vulnerability VCID-3kyb-4yvt-f7e1
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5yez-d5nj-q7eq
11
vulnerability VCID-6bez-sgg8-cbbq
12
vulnerability VCID-6d43-sjqw-tbbp
13
vulnerability VCID-6pzx-1e5t-xbes
14
vulnerability VCID-7ftk-sajb-akh4
15
vulnerability VCID-7krj-8vat-3ydy
16
vulnerability VCID-7s2y-pvar-qqe3
17
vulnerability VCID-8axm-4anr-27ht
18
vulnerability VCID-8gcm-7q3n-q7bm
19
vulnerability VCID-d4rc-pnv5-6uc8
20
vulnerability VCID-ese4-47tg-efbw
21
vulnerability VCID-fn5k-e2jr-6ube
22
vulnerability VCID-fyrq-yg2u-jkc7
23
vulnerability VCID-fysz-5mr6-fbf1
24
vulnerability VCID-g2pp-aahn-mfcd
25
vulnerability VCID-gu44-7hkr-muae
26
vulnerability VCID-hcjv-md55-3fcr
27
vulnerability VCID-jt89-ruvk-1kbj
28
vulnerability VCID-k4kb-21tp-4kc8
29
vulnerability VCID-ke1s-451y-p3cz
30
vulnerability VCID-kkfv-4jd1-bqdm
31
vulnerability VCID-kpew-rarv-83dg
32
vulnerability VCID-pc2n-ga7g-byga
33
vulnerability VCID-pdj3-4txb-vych
34
vulnerability VCID-pdtf-5zv7-2qaf
35
vulnerability VCID-pj4f-awuq-73g6
36
vulnerability VCID-prd8-51a5-pygj
37
vulnerability VCID-qayj-kts9-3fde
38
vulnerability VCID-qtav-hqnd-b7fa
39
vulnerability VCID-rhk3-ujc1-q7fj
40
vulnerability VCID-ssvj-7g27-1ug6
41
vulnerability VCID-svyk-az69-qbfw
42
vulnerability VCID-t95h-xhtm-zbdv
43
vulnerability VCID-tbud-pwyt-aye9
44
vulnerability VCID-umuk-3n1q-3qet
45
vulnerability VCID-wycq-jwzz-q7hf
46
vulnerability VCID-y8nd-7h3r-7fh5
47
vulnerability VCID-ym93-sxb8-fkdm
48
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8
aliases CVE-2007-6388
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgpj-aexq-7kah
5
url VCID-me4r-1qb6-dqdf
vulnerability_id VCID-me4r-1qb6-dqdf
summary A flaw in the handling of invalid Expect headers. If an attacker can influence the Expect header that a victim sends to a target site they could perform a cross-site scripting attack. It is known that some versions of Flash can set an arbitrary Expect header which can trigger this flaw. Not marked as a security issue for 2.0 or 2.2 as the cross-site scripting is only returned to the victim after the server times out a connection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3918.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3918
reference_id
reference_type
scores
0
value 0.91373
scoring_system epss
scoring_elements 0.99655
published_at 2026-04-04T12:55:00Z
1
value 0.91373
scoring_system epss
scoring_elements 0.99654
published_at 2026-04-01T12:55:00Z
2
value 0.91373
scoring_system epss
scoring_elements 0.99653
published_at 2026-04-02T12:55:00Z
3
value 0.91373
scoring_system epss
scoring_elements 0.99659
published_at 2026-04-13T12:55:00Z
4
value 0.91373
scoring_system epss
scoring_elements 0.99656
published_at 2026-04-07T12:55:00Z
5
value 0.91373
scoring_system epss
scoring_elements 0.99658
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=200732
reference_id 200732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=200732
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381376
reference_id 381376
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381376
5
reference_url https://httpd.apache.org/security/json/CVE-2006-3918.json
reference_id CVE-2006-3918
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2006-3918.json
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/28424.txt
reference_id CVE-2006-3918;OSVDB-27488
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/28424.txt
7
reference_url https://www.securityfocus.com/bid/19661/info
reference_id CVE-2006-3918;OSVDB-27488
reference_type exploit
scores
url https://www.securityfocus.com/bid/19661/info
8
reference_url https://access.redhat.com/errata/RHSA-2006:0618
reference_id RHSA-2006:0618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0618
9
reference_url https://access.redhat.com/errata/RHSA-2006:0619
reference_id RHSA-2006:0619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0619
10
reference_url https://access.redhat.com/errata/RHSA-2006:0692
reference_id RHSA-2006:0692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0692
11
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
12
reference_url https://usn.ubuntu.com/575-1/
reference_id USN-575-1
reference_type
scores
url https://usn.ubuntu.com/575-1/
fixed_packages
0
url pkg:apache/httpd@1.3.35
purl pkg:apache/httpd@1.3.35
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kgpj-aexq-7kah
4
vulnerability VCID-prd8-51a5-pygj
5
vulnerability VCID-qf2e-kgxk-pkhc
6
vulnerability VCID-srxw-jjvr-p3d5
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.35
aliases CVE-2006-3918
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-me4r-1qb6-dqdf
6
url VCID-prd8-51a5-pygj
vulnerability_id VCID-prd8-51a5-pygj
summary
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released.
Patches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
reference_id
reference_type
scores
0
value 0.79136
scoring_system epss
scoring_elements 0.99065
published_at 2026-04-13T12:55:00Z
1
value 0.79136
scoring_system epss
scoring_elements 0.99054
published_at 2026-04-01T12:55:00Z
2
value 0.79136
scoring_system epss
scoring_elements 0.99055
published_at 2026-04-02T12:55:00Z
3
value 0.79136
scoring_system epss
scoring_elements 0.99059
published_at 2026-04-04T12:55:00Z
4
value 0.79136
scoring_system epss
scoring_elements 0.99062
published_at 2026-04-07T12:55:00Z
5
value 0.79136
scoring_system epss
scoring_elements 0.99063
published_at 2026-04-08T12:55:00Z
6
value 0.79136
scoring_system epss
scoring_elements 0.99064
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=740045
reference_id 740045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=740045
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3368.json
reference_id CVE-2011-3368
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3368.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
reference_id CVE-2011-3368;OSVDB-76079
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
6
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
7
reference_url https://access.redhat.com/errata/RHSA-2011:1391
reference_id RHSA-2011:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1391
8
reference_url https://access.redhat.com/errata/RHSA-2011:1392
reference_id RHSA-2011:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1392
9
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
10
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
11
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:apache/httpd@2.0.65
purl pkg:apache/httpd@2.0.65
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.65
1
url pkg:apache/httpd@2.2.22
purl pkg:apache/httpd@2.2.22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-5bej-9h7w-33c8
6
vulnerability VCID-6bez-sgg8-cbbq
7
vulnerability VCID-6pzx-1e5t-xbes
8
vulnerability VCID-8axm-4anr-27ht
9
vulnerability VCID-8gcm-7q3n-q7bm
10
vulnerability VCID-ese4-47tg-efbw
11
vulnerability VCID-fyrq-yg2u-jkc7
12
vulnerability VCID-jt89-ruvk-1kbj
13
vulnerability VCID-k4kb-21tp-4kc8
14
vulnerability VCID-ke1s-451y-p3cz
15
vulnerability VCID-kpew-rarv-83dg
16
vulnerability VCID-pc2n-ga7g-byga
17
vulnerability VCID-qayj-kts9-3fde
18
vulnerability VCID-rhk3-ujc1-q7fj
19
vulnerability VCID-ssvj-7g27-1ug6
20
vulnerability VCID-tbud-pwyt-aye9
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22
aliases CVE-2011-3368
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prd8-51a5-pygj
7
url VCID-qf2e-kgxk-pkhc
vulnerability_id VCID-qf2e-kgxk-pkhc
summary An off-by-one flaw exists in the Rewrite module, mod_rewrite. Depending on the manner in which Apache httpd was compiled, this software defect may result in a vulnerability which, in combination with certain types of Rewrite rules in the web server configuration files, could be triggered remotely. For vulnerable builds, the nature of the vulnerability can be denial of service (crashing of web server processes) or potentially allow arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3747.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3747
reference_id
reference_type
scores
0
value 0.92606
scoring_system epss
scoring_elements 0.99741
published_at 2026-04-02T12:55:00Z
1
value 0.92606
scoring_system epss
scoring_elements 0.99742
published_at 2026-04-04T12:55:00Z
2
value 0.92606
scoring_system epss
scoring_elements 0.99743
published_at 2026-04-13T12:55:00Z
3
value 0.92606
scoring_system epss
scoring_elements 0.99744
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=380182
reference_id 380182
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=380182
4
reference_url https://httpd.apache.org/security/json/CVE-2006-3747.json
reference_id CVE-2006-3747
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2006-3747.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16752.rb
reference_id CVE-2006-3747;OSVDB-27588
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16752.rb
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/3996.c
reference_id CVE-2006-3747;OSVDB-27588
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/3996.c
7
reference_url https://security.gentoo.org/glsa/200608-01
reference_id GLSA-200608-01
reference_type
scores
url https://security.gentoo.org/glsa/200608-01
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2237.sh
reference_id OSVDB-27588;CVE-2006-3747
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2237.sh
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/remote/3680.sh
reference_id OSVDB-27588;CVE-2006-3747
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/remote/3680.sh
10
reference_url https://usn.ubuntu.com/328-1/
reference_id USN-328-1
reference_type
scores
url https://usn.ubuntu.com/328-1/
fixed_packages
0
url pkg:apache/httpd@1.3.37
purl pkg:apache/httpd@1.3.37
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kgpj-aexq-7kah
4
vulnerability VCID-prd8-51a5-pygj
5
vulnerability VCID-srxw-jjvr-p3d5
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.37
1
url pkg:apache/httpd@2.0.59
purl pkg:apache/httpd@2.0.59
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-1nh6-77uc-xbak
2
vulnerability VCID-3cea-3rkm-r7gs
3
vulnerability VCID-4zzy-q5zp-jkgm
4
vulnerability VCID-56kt-8bg6-zbcj
5
vulnerability VCID-5yez-d5nj-q7eq
6
vulnerability VCID-6d43-sjqw-tbbp
7
vulnerability VCID-7krj-8vat-3ydy
8
vulnerability VCID-95zk-suqh-j7e7
9
vulnerability VCID-d4rc-pnv5-6uc8
10
vulnerability VCID-dqkp-f1my-dbg9
11
vulnerability VCID-fn5k-e2jr-6ube
12
vulnerability VCID-g2pp-aahn-mfcd
13
vulnerability VCID-j3mb-97k1-uuh9
14
vulnerability VCID-kgpj-aexq-7kah
15
vulnerability VCID-kkfv-4jd1-bqdm
16
vulnerability VCID-pdj3-4txb-vych
17
vulnerability VCID-prd8-51a5-pygj
18
vulnerability VCID-qtav-hqnd-b7fa
19
vulnerability VCID-srxw-jjvr-p3d5
20
vulnerability VCID-ss79-kcpu-mqd5
21
vulnerability VCID-umuk-3n1q-3qet
22
vulnerability VCID-wycq-jwzz-q7hf
23
vulnerability VCID-y8nd-7h3r-7fh5
24
vulnerability VCID-ym93-sxb8-fkdm
25
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.59
2
url pkg:apache/httpd@2.2.3
purl pkg:apache/httpd@2.2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-115r-fep2-fyfm
1
vulnerability VCID-1189-ej89-hybs
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1nh6-77uc-xbak
5
vulnerability VCID-1zk6-7wv2-ukcz
6
vulnerability VCID-2261-sdn2-zbbu
7
vulnerability VCID-2xc4-7zg9-y7fw
8
vulnerability VCID-3cea-3rkm-r7gs
9
vulnerability VCID-3kyb-4yvt-f7e1
10
vulnerability VCID-4zzy-q5zp-jkgm
11
vulnerability VCID-56kt-8bg6-zbcj
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5yez-d5nj-q7eq
14
vulnerability VCID-6bez-sgg8-cbbq
15
vulnerability VCID-6d43-sjqw-tbbp
16
vulnerability VCID-6pzx-1e5t-xbes
17
vulnerability VCID-7ftk-sajb-akh4
18
vulnerability VCID-7krj-8vat-3ydy
19
vulnerability VCID-7s2y-pvar-qqe3
20
vulnerability VCID-8axm-4anr-27ht
21
vulnerability VCID-8gcm-7q3n-q7bm
22
vulnerability VCID-95zk-suqh-j7e7
23
vulnerability VCID-d4rc-pnv5-6uc8
24
vulnerability VCID-dqkp-f1my-dbg9
25
vulnerability VCID-ese4-47tg-efbw
26
vulnerability VCID-fn5k-e2jr-6ube
27
vulnerability VCID-fyrq-yg2u-jkc7
28
vulnerability VCID-fysz-5mr6-fbf1
29
vulnerability VCID-g2pp-aahn-mfcd
30
vulnerability VCID-gu44-7hkr-muae
31
vulnerability VCID-hcjv-md55-3fcr
32
vulnerability VCID-j3mb-97k1-uuh9
33
vulnerability VCID-jt89-ruvk-1kbj
34
vulnerability VCID-k4kb-21tp-4kc8
35
vulnerability VCID-ke1s-451y-p3cz
36
vulnerability VCID-kgpj-aexq-7kah
37
vulnerability VCID-kkfv-4jd1-bqdm
38
vulnerability VCID-kpew-rarv-83dg
39
vulnerability VCID-pc2n-ga7g-byga
40
vulnerability VCID-pdj3-4txb-vych
41
vulnerability VCID-pdtf-5zv7-2qaf
42
vulnerability VCID-pj4f-awuq-73g6
43
vulnerability VCID-prd8-51a5-pygj
44
vulnerability VCID-qayj-kts9-3fde
45
vulnerability VCID-qtav-hqnd-b7fa
46
vulnerability VCID-rhk3-ujc1-q7fj
47
vulnerability VCID-srxw-jjvr-p3d5
48
vulnerability VCID-ss79-kcpu-mqd5
49
vulnerability VCID-ssvj-7g27-1ug6
50
vulnerability VCID-svyk-az69-qbfw
51
vulnerability VCID-t95h-xhtm-zbdv
52
vulnerability VCID-tbud-pwyt-aye9
53
vulnerability VCID-umuk-3n1q-3qet
54
vulnerability VCID-wycq-jwzz-q7hf
55
vulnerability VCID-y8nd-7h3r-7fh5
56
vulnerability VCID-ym93-sxb8-fkdm
57
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.3
aliases CVE-2006-3747
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qf2e-kgxk-pkhc
8
url VCID-srxw-jjvr-p3d5
vulnerability_id VCID-srxw-jjvr-p3d5
summary The Apache HTTP server did not verify that a process was an Apache child process before sending it signals. A local attacker with the ability to run scripts on the HTTP server could manipulate the scoreboard and cause arbitrary processes to be terminated which could lead to a denial of service.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
1
reference_url http://bugs.gentoo.org/show_bug.cgi?id=186219
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=186219
2
reference_url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111
reference_id
reference_type
scores
url http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111
3
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588
4
reference_url http://httpd.apache.org/security/vulnerabilities_13.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_13.html
5
reference_url http://httpd.apache.org/security/vulnerabilities_20.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_20.html
6
reference_url http://httpd.apache.org/security/vulnerabilities_22.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html
7
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
8
reference_url http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192%40redhat.com%3e
reference_id
reference_type
scores
url http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192%40redhat.com%3e
9
reference_url http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2
reference_id
reference_type
scores
url http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2
10
reference_url http://osvdb.org/38939
reference_id
reference_type
scores
url http://osvdb.org/38939
11
reference_url http://rhn.redhat.com/errata/RHSA-2007-0556.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0556.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3304.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3304.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3304
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26977
published_at 2026-04-13T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27093
published_at 2026-04-01T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27078
published_at 2026-04-11T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27034
published_at 2026-04-12T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27133
published_at 2026-04-02T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27169
published_at 2026-04-04T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26961
published_at 2026-04-07T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27029
published_at 2026-04-08T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27075
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3304
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304
15
reference_url http://secunia.com/advisories/25827
reference_id
reference_type
scores
url http://secunia.com/advisories/25827
16
reference_url http://secunia.com/advisories/25830
reference_id
reference_type
scores
url http://secunia.com/advisories/25830
17
reference_url http://secunia.com/advisories/25920
reference_id
reference_type
scores
url http://secunia.com/advisories/25920
18
reference_url http://secunia.com/advisories/26211
reference_id
reference_type
scores
url http://secunia.com/advisories/26211
19
reference_url http://secunia.com/advisories/26273
reference_id
reference_type
scores
url http://secunia.com/advisories/26273
20
reference_url http://secunia.com/advisories/26443
reference_id
reference_type
scores
url http://secunia.com/advisories/26443
21
reference_url http://secunia.com/advisories/26508
reference_id
reference_type
scores
url http://secunia.com/advisories/26508
22
reference_url http://secunia.com/advisories/26611
reference_id
reference_type
scores
url http://secunia.com/advisories/26611
23
reference_url http://secunia.com/advisories/26759
reference_id
reference_type
scores
url http://secunia.com/advisories/26759
24
reference_url http://secunia.com/advisories/26790
reference_id
reference_type
scores
url http://secunia.com/advisories/26790
25
reference_url http://secunia.com/advisories/26822
reference_id
reference_type
scores
url http://secunia.com/advisories/26822
26
reference_url http://secunia.com/advisories/26842
reference_id
reference_type
scores
url http://secunia.com/advisories/26842
27
reference_url http://secunia.com/advisories/26993
reference_id
reference_type
scores
url http://secunia.com/advisories/26993
28
reference_url http://secunia.com/advisories/27121
reference_id
reference_type
scores
url http://secunia.com/advisories/27121
29
reference_url http://secunia.com/advisories/27209
reference_id
reference_type
scores
url http://secunia.com/advisories/27209
30
reference_url http://secunia.com/advisories/27563
reference_id
reference_type
scores
url http://secunia.com/advisories/27563
31
reference_url http://secunia.com/advisories/27732
reference_id
reference_type
scores
url http://secunia.com/advisories/27732
32
reference_url http://secunia.com/advisories/28212
reference_id
reference_type
scores
url http://secunia.com/advisories/28212
33
reference_url http://secunia.com/advisories/28224
reference_id
reference_type
scores
url http://secunia.com/advisories/28224
34
reference_url http://secunia.com/advisories/28606
reference_id
reference_type
scores
url http://secunia.com/advisories/28606
35
reference_url http://security.gentoo.org/glsa/glsa-200711-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200711-06.xml
36
reference_url http://security.psnc.pl/files/apache_report.pdf
reference_id
reference_type
scores
url http://security.psnc.pl/files/apache_report.pdf
37
reference_url http://securityreason.com/securityalert/2814
reference_id
reference_type
scores
url http://securityreason.com/securityalert/2814
38
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/35095
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/35095
39
reference_url https://issues.rpath.com/browse/RPL-1710
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1710
40
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
44
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
45
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
46
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
47
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
48
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
49
reference_url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
50
reference_url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
51
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
52
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
53
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
54
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
55
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
56
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
57
reference_url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
58
reference_url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
59
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
60
reference_url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
61
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
62
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
63
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11589
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11589
64
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
65
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
66
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
67
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-363.htm
68
reference_url http://svn.apache.org/viewvc?view=rev&revision=547987
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=rev&revision=547987
69
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
70
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984
71
reference_url http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only
reference_id
reference_type
scores
url http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only
72
reference_url http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
reference_id
reference_type
scores
url http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
73
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
74
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
75
reference_url http://www.novell.com/linux/security/advisories/2007_61_apache2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_61_apache2.html
76
reference_url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
77
reference_url http://www.redhat.com/errata/RHSA-2007-0532.html
reference_id
reference_type
scores
url http://www.redhat.com/errata/RHSA-2007-0532.html
78
reference_url http://www.redhat.com/support/errata/RHSA-2007-0557.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0557.html
79
reference_url http://www.redhat.com/support/errata/RHSA-2007-0662.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0662.html
80
reference_url http://www.redhat.com/support/errata/RHSA-2008-0261.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0261.html
81
reference_url http://www.securityfocus.com/archive/1/469899/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/469899/100/0/threaded
82
reference_url http://www.securityfocus.com/archive/1/471832/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471832/100/0/threaded
83
reference_url http://www.securityfocus.com/archive/1/505990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/505990/100/0/threaded
84
reference_url http://www.securityfocus.com/bid/24215
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24215
85
reference_url http://www.securitytracker.com/id?1018304
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018304
86
reference_url http://www.trustix.org/errata/2007/0026/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0026/
87
reference_url http://www.ubuntu.com/usn/usn-499-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-499-1
88
reference_url http://www.vupen.com/english/advisories/2007/2727
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2727
89
reference_url http://www.vupen.com/english/advisories/2007/3100
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3100
90
reference_url http://www.vupen.com/english/advisories/2007/3283
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3283
91
reference_url http://www.vupen.com/english/advisories/2007/3420
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3420
92
reference_url http://www.vupen.com/english/advisories/2007/3494
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3494
93
reference_url http://www.vupen.com/english/advisories/2007/4305
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/4305
94
reference_url http://www.vupen.com/english/advisories/2008/0233
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0233
95
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245111
reference_id 245111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245111
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
104
reference_url https://httpd.apache.org/security/json/CVE-2007-3304.json
reference_id CVE-2007-3304
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-3304.json
105
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3304
reference_id CVE-2007-3304
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-3304
106
reference_url https://security.gentoo.org/glsa/200711-06
reference_id GLSA-200711-06
reference_type
scores
url https://security.gentoo.org/glsa/200711-06
107
reference_url https://access.redhat.com/errata/RHSA-2007:0532
reference_id RHSA-2007:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0532
108
reference_url https://access.redhat.com/errata/RHSA-2007:0556
reference_id RHSA-2007:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0556
109
reference_url https://access.redhat.com/errata/RHSA-2007:0557
reference_id RHSA-2007:0557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0557
110
reference_url https://access.redhat.com/errata/RHSA-2007:0662
reference_id RHSA-2007:0662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0662
111
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
112
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
113
reference_url https://usn.ubuntu.com/499-1/
reference_id USN-499-1
reference_type
scores
url https://usn.ubuntu.com/499-1/
fixed_packages
0
url pkg:apache/httpd@1.3.39
purl pkg:apache/httpd@1.3.39
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-kgpj-aexq-7kah
3
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.39
1
url pkg:apache/httpd@2.0.61
purl pkg:apache/httpd@2.0.61
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-dqkp-f1my-dbg9
9
vulnerability VCID-fn5k-e2jr-6ube
10
vulnerability VCID-g2pp-aahn-mfcd
11
vulnerability VCID-kgpj-aexq-7kah
12
vulnerability VCID-kkfv-4jd1-bqdm
13
vulnerability VCID-pdj3-4txb-vych
14
vulnerability VCID-prd8-51a5-pygj
15
vulnerability VCID-qtav-hqnd-b7fa
16
vulnerability VCID-ss79-kcpu-mqd5
17
vulnerability VCID-umuk-3n1q-3qet
18
vulnerability VCID-wycq-jwzz-q7hf
19
vulnerability VCID-y8nd-7h3r-7fh5
20
vulnerability VCID-ym93-sxb8-fkdm
21
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.61
2
url pkg:apache/httpd@2.2.6
purl pkg:apache/httpd@2.2.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-115r-fep2-fyfm
1
vulnerability VCID-1189-ej89-hybs
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2261-sdn2-zbbu
6
vulnerability VCID-2xc4-7zg9-y7fw
7
vulnerability VCID-3cea-3rkm-r7gs
8
vulnerability VCID-3kyb-4yvt-f7e1
9
vulnerability VCID-4zzy-q5zp-jkgm
10
vulnerability VCID-56kt-8bg6-zbcj
11
vulnerability VCID-5bej-9h7w-33c8
12
vulnerability VCID-5yez-d5nj-q7eq
13
vulnerability VCID-6bez-sgg8-cbbq
14
vulnerability VCID-6d43-sjqw-tbbp
15
vulnerability VCID-6pzx-1e5t-xbes
16
vulnerability VCID-7ftk-sajb-akh4
17
vulnerability VCID-7krj-8vat-3ydy
18
vulnerability VCID-7s2y-pvar-qqe3
19
vulnerability VCID-8axm-4anr-27ht
20
vulnerability VCID-8gcm-7q3n-q7bm
21
vulnerability VCID-d4rc-pnv5-6uc8
22
vulnerability VCID-dqkp-f1my-dbg9
23
vulnerability VCID-ese4-47tg-efbw
24
vulnerability VCID-fn5k-e2jr-6ube
25
vulnerability VCID-fyrq-yg2u-jkc7
26
vulnerability VCID-fysz-5mr6-fbf1
27
vulnerability VCID-g2pp-aahn-mfcd
28
vulnerability VCID-gu44-7hkr-muae
29
vulnerability VCID-hcjv-md55-3fcr
30
vulnerability VCID-jt89-ruvk-1kbj
31
vulnerability VCID-k4kb-21tp-4kc8
32
vulnerability VCID-ke1s-451y-p3cz
33
vulnerability VCID-kgpj-aexq-7kah
34
vulnerability VCID-kkfv-4jd1-bqdm
35
vulnerability VCID-kpew-rarv-83dg
36
vulnerability VCID-pc2n-ga7g-byga
37
vulnerability VCID-pdj3-4txb-vych
38
vulnerability VCID-pdtf-5zv7-2qaf
39
vulnerability VCID-pj4f-awuq-73g6
40
vulnerability VCID-prd8-51a5-pygj
41
vulnerability VCID-qayj-kts9-3fde
42
vulnerability VCID-qtav-hqnd-b7fa
43
vulnerability VCID-rhk3-ujc1-q7fj
44
vulnerability VCID-ss79-kcpu-mqd5
45
vulnerability VCID-ssvj-7g27-1ug6
46
vulnerability VCID-svyk-az69-qbfw
47
vulnerability VCID-t95h-xhtm-zbdv
48
vulnerability VCID-tbud-pwyt-aye9
49
vulnerability VCID-umuk-3n1q-3qet
50
vulnerability VCID-wycq-jwzz-q7hf
51
vulnerability VCID-y8nd-7h3r-7fh5
52
vulnerability VCID-ym93-sxb8-fkdm
53
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6
aliases CVE-2007-3304
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srxw-jjvr-p3d5
9
url VCID-x89d-7t1q-skcx
vulnerability_id VCID-x89d-7t1q-skcx
summary A buffer overflow was found in the Apache proxy module, mod_proxy, which can be triggered by receiving an invalid Content-Length header. In order to exploit this issue an attacker would need to get an Apache installation that was configured as a proxy to connect to a malicious site. This would cause the Apache child processing the request to crash, although this does not represent a significant Denial of Service attack as requests will continue to be handled by other Apache child processes. This issue may lead to remote arbitrary code execution on some BSD platforms.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0492
reference_id
reference_type
scores
0
value 0.23714
scoring_system epss
scoring_elements 0.95999
published_at 2026-04-13T12:55:00Z
1
value 0.23714
scoring_system epss
scoring_elements 0.95963
published_at 2026-04-01T12:55:00Z
2
value 0.23714
scoring_system epss
scoring_elements 0.9597
published_at 2026-04-02T12:55:00Z
3
value 0.23714
scoring_system epss
scoring_elements 0.95977
published_at 2026-04-04T12:55:00Z
4
value 0.23714
scoring_system epss
scoring_elements 0.95981
published_at 2026-04-07T12:55:00Z
5
value 0.23714
scoring_system epss
scoring_elements 0.95991
published_at 2026-04-08T12:55:00Z
6
value 0.23714
scoring_system epss
scoring_elements 0.95993
published_at 2026-04-09T12:55:00Z
7
value 0.23714
scoring_system epss
scoring_elements 0.95996
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0492
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430527
reference_id 430527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430527
3
reference_url https://httpd.apache.org/security/json/CVE-2004-0492.json
reference_id CVE-2004-0492
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0492.json
4
reference_url https://access.redhat.com/errata/RHSA-2004:245
reference_id RHSA-2004:245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:245
fixed_packages
0
url pkg:apache/httpd@1.3.32
purl pkg:apache/httpd@1.3.32
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
9
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.32
aliases CVE-2004-0492
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x89d-7t1q-skcx
10
url VCID-zn9e-rcpj-yuax
vulnerability_id VCID-zn9e-rcpj-yuax
summary A buffer overflow in mod_include could allow a local user who is authorised to create server side include (SSI) files to gain the privileges of a httpd child.
references
0
reference_url http://marc.info/?l=bugtraq&m=109906660225051&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=109906660225051&w=2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0940.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0940.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0940
reference_id
reference_type
scores
0
value 0.03684
scoring_system epss
scoring_elements 0.87928
published_at 2026-04-13T12:55:00Z
1
value 0.03684
scoring_system epss
scoring_elements 0.87925
published_at 2026-04-09T12:55:00Z
2
value 0.03684
scoring_system epss
scoring_elements 0.87936
published_at 2026-04-11T12:55:00Z
3
value 0.03684
scoring_system epss
scoring_elements 0.87929
published_at 2026-04-12T12:55:00Z
4
value 0.03684
scoring_system epss
scoring_elements 0.87871
published_at 2026-04-01T12:55:00Z
5
value 0.03684
scoring_system epss
scoring_elements 0.87881
published_at 2026-04-02T12:55:00Z
6
value 0.03684
scoring_system epss
scoring_elements 0.87894
published_at 2026-04-04T12:55:00Z
7
value 0.03684
scoring_system epss
scoring_elements 0.87898
published_at 2026-04-07T12:55:00Z
8
value 0.03684
scoring_system epss
scoring_elements 0.87919
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0940
3
reference_url http://secunia.com/advisories/12898/
reference_id
reference_type
scores
url http://secunia.com/advisories/12898/
4
reference_url http://secunia.com/advisories/19073
reference_id
reference_type
scores
url http://secunia.com/advisories/19073
5
reference_url http://securitytracker.com/id?1011783
reference_id
reference_type
scores
url http://securitytracker.com/id?1011783
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17785
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17785
7
reference_url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
14
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
15
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
16
reference_url http://www.apacheweek.com/features/security-13
reference_id
reference_type
scores
url http://www.apacheweek.com/features/security-13
17
reference_url http://www.debian.org/security/2004/dsa-594
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-594
18
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:134
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:134
19
reference_url http://www.redhat.com/support/errata/RHSA-2004-600.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2004-600.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2005-816.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-816.html
21
reference_url http://www.securityfocus.com/bid/11471
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11471
22
reference_url http://www.vupen.com/english/advisories/2006/0789
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0789
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430526
reference_id 430526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430526
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
reference_id cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
45
reference_url https://httpd.apache.org/security/json/CVE-2004-0940.json
reference_id CVE-2004-0940
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0940.json
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0940
reference_id CVE-2004-0940
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2004-0940
47
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/24694.c
reference_id CVE-2004-0940;OSVDB-12881
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/24694.c
48
reference_url https://www.securityfocus.com/bid/11471/info
reference_id CVE-2004-0940;OSVDB-12881
reference_type exploit
scores
url https://www.securityfocus.com/bid/11471/info
49
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/587.c
reference_id OSVDB-11003;CVE-2004-0940
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/587.c
50
reference_url https://access.redhat.com/errata/RHSA-2004:600
reference_id RHSA-2004:600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:600
51
reference_url https://access.redhat.com/errata/RHSA-2004:653
reference_id RHSA-2004:653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:653
52
reference_url https://access.redhat.com/errata/RHSA-2005:816
reference_id RHSA-2005:816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:816
fixed_packages
0
url pkg:apache/httpd@1.3.33
purl pkg:apache/httpd@1.3.33
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.33
aliases CVE-2004-0940
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn9e-rcpj-yuax
Fixing_vulnerabilities
0
url VCID-3m9y-maes-5ycp
vulnerability_id VCID-3m9y-maes-5ycp
summary Apache does not filter terminal escape sequences from error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0020.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0020
reference_id
reference_type
scores
0
value 0.20267
scoring_system epss
scoring_elements 0.95513
published_at 2026-04-13T12:55:00Z
1
value 0.20267
scoring_system epss
scoring_elements 0.95476
published_at 2026-04-01T12:55:00Z
2
value 0.20267
scoring_system epss
scoring_elements 0.95486
published_at 2026-04-02T12:55:00Z
3
value 0.20267
scoring_system epss
scoring_elements 0.95492
published_at 2026-04-04T12:55:00Z
4
value 0.20267
scoring_system epss
scoring_elements 0.95497
published_at 2026-04-07T12:55:00Z
5
value 0.20267
scoring_system epss
scoring_elements 0.95503
published_at 2026-04-08T12:55:00Z
6
value 0.20267
scoring_system epss
scoring_elements 0.95506
published_at 2026-04-09T12:55:00Z
7
value 0.20267
scoring_system epss
scoring_elements 0.9551
published_at 2026-04-11T12:55:00Z
8
value 0.20267
scoring_system epss
scoring_elements 0.95512
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0020
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616937
reference_id 1616937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616937
4
reference_url https://httpd.apache.org/security/json/CVE-2003-0020.json
reference_id CVE-2003-0020
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2003-0020.json
5
reference_url https://access.redhat.com/errata/RHSA-2003:082
reference_id RHSA-2003:082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:082
6
reference_url https://access.redhat.com/errata/RHSA-2003:083
reference_id RHSA-2003:083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:083
7
reference_url https://access.redhat.com/errata/RHSA-2003:104
reference_id RHSA-2003:104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:104
8
reference_url https://access.redhat.com/errata/RHSA-2003:139
reference_id RHSA-2003:139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:139
9
reference_url https://access.redhat.com/errata/RHSA-2003:243
reference_id RHSA-2003:243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:243
10
reference_url https://access.redhat.com/errata/RHSA-2003:244
reference_id RHSA-2003:244
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:244
fixed_packages
0
url pkg:apache/httpd@1.3.31
purl pkg:apache/httpd@1.3.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
9
vulnerability VCID-x89d-7t1q-skcx
10
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.31
1
url pkg:apache/httpd@2.0.49
purl pkg:apache/httpd@2.0.49
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-1nh6-77uc-xbak
2
vulnerability VCID-3cea-3rkm-r7gs
3
vulnerability VCID-3wbg-bxvj-1kca
4
vulnerability VCID-4zzy-q5zp-jkgm
5
vulnerability VCID-56kt-8bg6-zbcj
6
vulnerability VCID-5yez-d5nj-q7eq
7
vulnerability VCID-6d43-sjqw-tbbp
8
vulnerability VCID-76s2-26cr-syd1
9
vulnerability VCID-7krj-8vat-3ydy
10
vulnerability VCID-95zk-suqh-j7e7
11
vulnerability VCID-agrr-tcwf-afe7
12
vulnerability VCID-bfvg-u6sz-6qc6
13
vulnerability VCID-d4rc-pnv5-6uc8
14
vulnerability VCID-d66x-55ub-vkfw
15
vulnerability VCID-dqkp-f1my-dbg9
16
vulnerability VCID-en6m-ye18-97hk
17
vulnerability VCID-f8n9-ampd-yyah
18
vulnerability VCID-fn5k-e2jr-6ube
19
vulnerability VCID-fq9j-uewn-q7h7
20
vulnerability VCID-g1jc-8vza-u3ad
21
vulnerability VCID-g2pp-aahn-mfcd
22
vulnerability VCID-j3mb-97k1-uuh9
23
vulnerability VCID-kcwg-hswv-2uf7
24
vulnerability VCID-kgpj-aexq-7kah
25
vulnerability VCID-kkfv-4jd1-bqdm
26
vulnerability VCID-m8uk-byje-dqey
27
vulnerability VCID-pdj3-4txb-vych
28
vulnerability VCID-prd8-51a5-pygj
29
vulnerability VCID-pufp-t6dh-xqhv
30
vulnerability VCID-qf2e-kgxk-pkhc
31
vulnerability VCID-qtav-hqnd-b7fa
32
vulnerability VCID-qufv-kta7-1feu
33
vulnerability VCID-rhhj-jhej-gfcj
34
vulnerability VCID-srxw-jjvr-p3d5
35
vulnerability VCID-ss79-kcpu-mqd5
36
vulnerability VCID-umuk-3n1q-3qet
37
vulnerability VCID-v2g6-h93b-euer
38
vulnerability VCID-vqs2-5x99-7qfd
39
vulnerability VCID-wycq-jwzz-q7hf
40
vulnerability VCID-y56e-kuj4-97f6
41
vulnerability VCID-y8nd-7h3r-7fh5
42
vulnerability VCID-ym93-sxb8-fkdm
43
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.49
aliases CVE-2003-0020
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3m9y-maes-5ycp
1
url VCID-9xk2-as1c-7kd2
vulnerability_id VCID-9xk2-as1c-7kd2
summary A starvation issue on listening sockets occurs when a short-lived connection on a rarely-accessed listening socket will cause a child to hold the accept mutex and block out new connections until another connection arrives on that rarely-accessed listening socket. This issue is known to affect some versions of AIX, Solaris, and Tru64; it is known to not affect FreeBSD or Linux.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0174.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0174
reference_id
reference_type
scores
0
value 0.1992
scoring_system epss
scoring_elements 0.95459
published_at 2026-04-13T12:55:00Z
1
value 0.1992
scoring_system epss
scoring_elements 0.95425
published_at 2026-04-01T12:55:00Z
2
value 0.1992
scoring_system epss
scoring_elements 0.95434
published_at 2026-04-02T12:55:00Z
3
value 0.1992
scoring_system epss
scoring_elements 0.9544
published_at 2026-04-04T12:55:00Z
4
value 0.1992
scoring_system epss
scoring_elements 0.95444
published_at 2026-04-07T12:55:00Z
5
value 0.1992
scoring_system epss
scoring_elements 0.95451
published_at 2026-04-08T12:55:00Z
6
value 0.1992
scoring_system epss
scoring_elements 0.95453
published_at 2026-04-09T12:55:00Z
7
value 0.1992
scoring_system epss
scoring_elements 0.95457
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0174
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617165
reference_id 1617165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617165
3
reference_url https://httpd.apache.org/security/json/CVE-2004-0174.json
reference_id CVE-2004-0174
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0174.json
4
reference_url https://access.redhat.com/errata/RHSA-2004:405
reference_id RHSA-2004:405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:405
fixed_packages
0
url pkg:apache/httpd@1.3.31
purl pkg:apache/httpd@1.3.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
9
vulnerability VCID-x89d-7t1q-skcx
10
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.31
1
url pkg:apache/httpd@2.0.49
purl pkg:apache/httpd@2.0.49
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-1nh6-77uc-xbak
2
vulnerability VCID-3cea-3rkm-r7gs
3
vulnerability VCID-3wbg-bxvj-1kca
4
vulnerability VCID-4zzy-q5zp-jkgm
5
vulnerability VCID-56kt-8bg6-zbcj
6
vulnerability VCID-5yez-d5nj-q7eq
7
vulnerability VCID-6d43-sjqw-tbbp
8
vulnerability VCID-76s2-26cr-syd1
9
vulnerability VCID-7krj-8vat-3ydy
10
vulnerability VCID-95zk-suqh-j7e7
11
vulnerability VCID-agrr-tcwf-afe7
12
vulnerability VCID-bfvg-u6sz-6qc6
13
vulnerability VCID-d4rc-pnv5-6uc8
14
vulnerability VCID-d66x-55ub-vkfw
15
vulnerability VCID-dqkp-f1my-dbg9
16
vulnerability VCID-en6m-ye18-97hk
17
vulnerability VCID-f8n9-ampd-yyah
18
vulnerability VCID-fn5k-e2jr-6ube
19
vulnerability VCID-fq9j-uewn-q7h7
20
vulnerability VCID-g1jc-8vza-u3ad
21
vulnerability VCID-g2pp-aahn-mfcd
22
vulnerability VCID-j3mb-97k1-uuh9
23
vulnerability VCID-kcwg-hswv-2uf7
24
vulnerability VCID-kgpj-aexq-7kah
25
vulnerability VCID-kkfv-4jd1-bqdm
26
vulnerability VCID-m8uk-byje-dqey
27
vulnerability VCID-pdj3-4txb-vych
28
vulnerability VCID-prd8-51a5-pygj
29
vulnerability VCID-pufp-t6dh-xqhv
30
vulnerability VCID-qf2e-kgxk-pkhc
31
vulnerability VCID-qtav-hqnd-b7fa
32
vulnerability VCID-qufv-kta7-1feu
33
vulnerability VCID-rhhj-jhej-gfcj
34
vulnerability VCID-srxw-jjvr-p3d5
35
vulnerability VCID-ss79-kcpu-mqd5
36
vulnerability VCID-umuk-3n1q-3qet
37
vulnerability VCID-v2g6-h93b-euer
38
vulnerability VCID-vqs2-5x99-7qfd
39
vulnerability VCID-wycq-jwzz-q7hf
40
vulnerability VCID-y56e-kuj4-97f6
41
vulnerability VCID-y8nd-7h3r-7fh5
42
vulnerability VCID-ym93-sxb8-fkdm
43
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.49
aliases CVE-2004-0174
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xk2-as1c-7kd2
2
url VCID-e2sp-bna5-mqb6
vulnerability_id VCID-e2sp-bna5-mqb6
summary A bug in the parsing of Allow/Deny rules using IP addresses without a netmask on big-endian 64-bit platforms causes the rules to fail to match.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0993
reference_id
reference_type
scores
0
value 0.05029
scoring_system epss
scoring_elements 0.89743
published_at 2026-04-13T12:55:00Z
1
value 0.05029
scoring_system epss
scoring_elements 0.89701
published_at 2026-04-01T12:55:00Z
2
value 0.05029
scoring_system epss
scoring_elements 0.89704
published_at 2026-04-02T12:55:00Z
3
value 0.05029
scoring_system epss
scoring_elements 0.89719
published_at 2026-04-04T12:55:00Z
4
value 0.05029
scoring_system epss
scoring_elements 0.89721
published_at 2026-04-07T12:55:00Z
5
value 0.05029
scoring_system epss
scoring_elements 0.89738
published_at 2026-04-08T12:55:00Z
6
value 0.05029
scoring_system epss
scoring_elements 0.89745
published_at 2026-04-09T12:55:00Z
7
value 0.05029
scoring_system epss
scoring_elements 0.89751
published_at 2026-04-11T12:55:00Z
8
value 0.05029
scoring_system epss
scoring_elements 0.8975
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0993
1
reference_url https://httpd.apache.org/security/json/CVE-2003-0993.json
reference_id CVE-2003-0993
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2003-0993.json
fixed_packages
0
url pkg:apache/httpd@1.3.31
purl pkg:apache/httpd@1.3.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
9
vulnerability VCID-x89d-7t1q-skcx
10
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.31
aliases CVE-2003-0993
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e2sp-bna5-mqb6
3
url VCID-ug4a-zxkg-cbew
vulnerability_id VCID-ug4a-zxkg-cbew
summary mod_digest does not properly verify the nonce of a client response by using a AuthNonce secret. This could allow a malicious user who is able to sniff network traffic to conduct a replay attack against a website using Digest protection. Note that mod_digest implements an older version of the MD5 Digest Authentication specification which is known not to work with modern browsers. This issue does not affect mod_auth_digest.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0987.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0987.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0987
reference_id
reference_type
scores
0
value 0.19648
scoring_system epss
scoring_elements 0.95422
published_at 2026-04-13T12:55:00Z
1
value 0.19648
scoring_system epss
scoring_elements 0.95387
published_at 2026-04-01T12:55:00Z
2
value 0.19648
scoring_system epss
scoring_elements 0.95396
published_at 2026-04-02T12:55:00Z
3
value 0.19648
scoring_system epss
scoring_elements 0.95402
published_at 2026-04-04T12:55:00Z
4
value 0.19648
scoring_system epss
scoring_elements 0.95406
published_at 2026-04-07T12:55:00Z
5
value 0.19648
scoring_system epss
scoring_elements 0.95412
published_at 2026-04-08T12:55:00Z
6
value 0.19648
scoring_system epss
scoring_elements 0.95415
published_at 2026-04-09T12:55:00Z
7
value 0.19648
scoring_system epss
scoring_elements 0.9542
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0987
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430529
reference_id 430529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430529
3
reference_url https://httpd.apache.org/security/json/CVE-2003-0987.json
reference_id CVE-2003-0987
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2003-0987.json
4
reference_url https://access.redhat.com/errata/RHSA-2004:600
reference_id RHSA-2004:600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:600
5
reference_url https://access.redhat.com/errata/RHSA-2004:653
reference_id RHSA-2004:653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:653
6
reference_url https://access.redhat.com/errata/RHSA-2005:816
reference_id RHSA-2005:816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:816
fixed_packages
0
url pkg:apache/httpd@1.3.31
purl pkg:apache/httpd@1.3.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-dqkp-f1my-dbg9
2
vulnerability VCID-j3mb-97k1-uuh9
3
vulnerability VCID-kcwg-hswv-2uf7
4
vulnerability VCID-kgpj-aexq-7kah
5
vulnerability VCID-me4r-1qb6-dqdf
6
vulnerability VCID-prd8-51a5-pygj
7
vulnerability VCID-qf2e-kgxk-pkhc
8
vulnerability VCID-srxw-jjvr-p3d5
9
vulnerability VCID-x89d-7t1q-skcx
10
vulnerability VCID-zn9e-rcpj-yuax
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.31
aliases CVE-2003-0987
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ug4a-zxkg-cbew
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.31