| 0 |
| url |
VCID-115r-fep2-fyfm |
| vulnerability_id |
VCID-115r-fep2-fyfm |
| summary |
A flaw was found in the mod_proxy_balancer module. On sites where mod_proxy_balancer is enabled, an authorized user could send a carefully crafted request that would cause the Apache child process handling that request to crash. This could lead to a denial of service if using a threaded Multi-Processing Module. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6422 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.902 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.90155 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.90158 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.9017 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.90176 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.90191 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.90197 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.90206 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.05471 |
| scoring_system |
epss |
| scoring_elements |
0.90205 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6422 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.8 |
| purl |
pkg:apache/httpd@2.2.8 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 7 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 8 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 9 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 10 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 11 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 12 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 15 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 16 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 17 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 18 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 19 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 24 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 25 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 26 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 27 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 28 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 29 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 30 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 31 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 32 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 33 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 34 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 35 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 36 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 37 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 38 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 39 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 40 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 41 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 42 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 43 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 44 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 45 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 46 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 47 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 48 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8 |
|
|
| aliases |
CVE-2007-6422
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-115r-fep2-fyfm |
|
| 1 |
| url |
VCID-1189-ej89-hybs |
| vulnerability_id |
VCID-1189-ej89-hybs |
| summary |
mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.96968 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.96996 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.96991 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.96992 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.96994 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.96995 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.96976 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.9698 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.34517 |
| scoring_system |
epss |
| scoring_elements |
0.96982 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.26 |
| purl |
pkg:apache/httpd@2.4.26 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 1 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 2 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 3 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 4 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 5 |
| vulnerability |
VCID-6vxq-uxxw-ybeh |
|
| 6 |
| vulnerability |
VCID-7u2r-egf2-vfhx |
|
| 7 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 8 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 9 |
| vulnerability |
VCID-9vzm-qtye-ufh2 |
|
| 10 |
| vulnerability |
VCID-a9rw-3s1y-hqd7 |
|
| 11 |
| vulnerability |
VCID-apfh-r85v-dbhz |
|
| 12 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 13 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 14 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 15 |
| vulnerability |
VCID-e3jc-83a7-8uhh |
|
| 16 |
| vulnerability |
VCID-eesz-v6ae-gya3 |
|
| 17 |
| vulnerability |
VCID-ehv1-yvpu-ubcg |
|
| 18 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 21 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 22 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 23 |
| vulnerability |
VCID-khfr-kgtb-rfam |
|
| 24 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 25 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 26 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 27 |
| vulnerability |
VCID-v41h-pbbe-zfas |
|
| 28 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 29 |
| vulnerability |
VCID-y3k1-c4rn-xbc2 |
|
| 30 |
| vulnerability |
VCID-yz3c-arnr-y3cs |
|
| 31 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.26 |
|
|
| aliases |
CVE-2017-3169
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1189-ej89-hybs |
|
| 2 |
| url |
VCID-1bv2-mkj8-ubaz |
| vulnerability_id |
VCID-1bv2-mkj8-ubaz |
| summary |
mod_rewrite does not filter terminal escape sequences from logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1862 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.39611 |
| scoring_system |
epss |
| scoring_elements |
0.97309 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.39611 |
| scoring_system |
epss |
| scoring_elements |
0.97287 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.39611 |
| scoring_system |
epss |
| scoring_elements |
0.97307 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.39611 |
| scoring_system |
epss |
| scoring_elements |
0.97308 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.39611 |
| scoring_system |
epss |
| scoring_elements |
0.97292 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.39611 |
| scoring_system |
epss |
| scoring_elements |
0.97297 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.39611 |
| scoring_system |
epss |
| scoring_elements |
0.97298 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.39611 |
| scoring_system |
epss |
| scoring_elements |
0.97304 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1862 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.25 |
| purl |
pkg:apache/httpd@2.2.25 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 2 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 3 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 4 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 5 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 6 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 7 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 8 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 9 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 10 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 11 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 12 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 13 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 14 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.25 |
|
|
| aliases |
CVE-2013-1862
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1bv2-mkj8-ubaz |
|
| 3 |
| url |
VCID-1d24-sy5z-jfhh |
| vulnerability_id |
VCID-1d24-sy5z-jfhh |
| summary |
HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. This fix adds the "MergeTrailers" directive to restore legacy behavior. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-5704 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.9846 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98446 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98448 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98451 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98453 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98457 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98458 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98461 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-5704 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.12 |
| purl |
pkg:apache/httpd@2.4.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 3 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 4 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 5 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 6 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 7 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 8 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 9 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 10 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 11 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 12 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 13 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 14 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 15 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 16 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 17 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 18 |
| vulnerability |
VCID-gqat-458a-67g2 |
|
| 19 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 20 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 21 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 22 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 23 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 24 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 25 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 26 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 27 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 28 |
| vulnerability |
VCID-tcmz-a5dq-d7cj |
|
| 29 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 30 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 31 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 32 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.12 |
|
|
| aliases |
CVE-2013-5704
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1d24-sy5z-jfhh |
|
| 4 |
| url |
VCID-1nh6-77uc-xbak |
| vulnerability_id |
VCID-1nh6-77uc-xbak |
| summary |
A bug was found in the mod_cache module. On sites where caching is enabled, a remote attacker could send a carefully crafted request that would cause the Apache child process handling that request to crash. This could lead to a denial of service if using a threaded Multi-Processing Module. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.27987 |
| scoring_system |
epss |
| scoring_elements |
0.9647 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.27987 |
| scoring_system |
epss |
| scoring_elements |
0.96452 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.27987 |
| scoring_system |
epss |
| scoring_elements |
0.9646 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.27987 |
| scoring_system |
epss |
| scoring_elements |
0.96463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.27987 |
| scoring_system |
epss |
| scoring_elements |
0.96467 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.36211 |
| scoring_system |
epss |
| scoring_elements |
0.97074 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.36211 |
| scoring_system |
epss |
| scoring_elements |
0.97081 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.36211 |
| scoring_system |
epss |
| scoring_elements |
0.97086 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1863 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.6 |
| purl |
pkg:apache/httpd@2.2.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-115r-fep2-fyfm |
|
| 1 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 2 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 3 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 4 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 5 |
| vulnerability |
VCID-2261-sdn2-zbbu |
|
| 6 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 7 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 8 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 9 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 10 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 11 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 12 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 13 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 14 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 15 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 16 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 17 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 18 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 19 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 20 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 21 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 22 |
| vulnerability |
VCID-dqkp-f1my-dbg9 |
|
| 23 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 24 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 25 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 26 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 27 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 28 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 29 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 30 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 31 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 32 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 33 |
| vulnerability |
VCID-kgpj-aexq-7kah |
|
| 34 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 35 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 36 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 37 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 38 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 39 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 40 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 41 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 42 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 43 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 44 |
| vulnerability |
VCID-ss79-kcpu-mqd5 |
|
| 45 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 46 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 47 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 48 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 49 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 50 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 51 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 52 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 53 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6 |
|
|
| aliases |
CVE-2007-1863
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1nh6-77uc-xbak |
|
| 5 |
| url |
VCID-1zk6-7wv2-ukcz |
| vulnerability_id |
VCID-1zk6-7wv2-ukcz |
| summary |
A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0118 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.41327 |
| scoring_system |
epss |
| scoring_elements |
0.97395 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.41327 |
| scoring_system |
epss |
| scoring_elements |
0.97372 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.41327 |
| scoring_system |
epss |
| scoring_elements |
0.97392 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.41327 |
| scoring_system |
epss |
| scoring_elements |
0.97394 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.41327 |
| scoring_system |
epss |
| scoring_elements |
0.97378 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.41327 |
| scoring_system |
epss |
| scoring_elements |
0.97383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.41327 |
| scoring_system |
epss |
| scoring_elements |
0.97384 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.41327 |
| scoring_system |
epss |
| scoring_elements |
0.9739 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0118 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.10 |
| purl |
pkg:apache/httpd@2.4.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 6 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 7 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 8 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 9 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 10 |
| vulnerability |
VCID-8eqf-c42n-y7dt |
|
| 11 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 12 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 13 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 14 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 15 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 16 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 17 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 18 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 21 |
| vulnerability |
VCID-gqat-458a-67g2 |
|
| 22 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 25 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 26 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 27 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 28 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 29 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 30 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 31 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 32 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 33 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 34 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 35 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.10 |
|
|
| aliases |
CVE-2014-0118
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1zk6-7wv2-ukcz |
|
| 6 |
| url |
VCID-2261-sdn2-zbbu |
| vulnerability_id |
VCID-2261-sdn2-zbbu |
| summary |
A flaw was found in the mod_proxy_balancer module. On sites where mod_proxy_balancer is enabled, a cross-site scripting attack against an authorized user is possible. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.87033 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.86981 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.86992 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.87011 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.87004 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.87024 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.87031 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.87045 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03213 |
| scoring_system |
epss |
| scoring_elements |
0.87039 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6421 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.8 |
| purl |
pkg:apache/httpd@2.2.8 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 7 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 8 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 9 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 10 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 11 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 12 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 15 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 16 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 17 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 18 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 19 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 24 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 25 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 26 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 27 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 28 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 29 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 30 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 31 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 32 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 33 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 34 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 35 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 36 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 37 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 38 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 39 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 40 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 41 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 42 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 43 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 44 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 45 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 46 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 47 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 48 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8 |
|
|
| aliases |
CVE-2007-6421
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2261-sdn2-zbbu |
|
| 7 |
| url |
VCID-2xc4-7zg9-y7fw |
| vulnerability_id |
VCID-2xc4-7zg9-y7fw |
| summary |
HTTP_PROXY is a well-defined environment variable in a CGI process, which collided with a number of libraries which failed to avoid colliding with this CGI namespace. A mitigation is provided for the httpd CGI environment to avoid populating the "HTTP_PROXY" variable from a "Proxy:" header, which has never been registered by IANA. This workaround and patch are documented in the ASF Advisory at asf-httpoxy-response.txt and incorporated in the 2.4.25 and 2.2.32 releases. Note: This is not assigned an httpd severity, as it is a defect in other software which overloaded well-established CGI environment variables, and does not reflect an error in HTTP server software. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5387 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.41959 |
| scoring_system |
epss |
| scoring_elements |
0.9741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.41959 |
| scoring_system |
epss |
| scoring_elements |
0.97403 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.60283 |
| scoring_system |
epss |
| scoring_elements |
0.98278 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.60283 |
| scoring_system |
epss |
| scoring_elements |
0.98268 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.60283 |
| scoring_system |
epss |
| scoring_elements |
0.98269 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.60283 |
| scoring_system |
epss |
| scoring_elements |
0.98274 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.60283 |
| scoring_system |
epss |
| scoring_elements |
0.98277 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5387 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.25 |
| purl |
pkg:apache/httpd@2.4.25 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 3 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 4 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 5 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 6 |
| vulnerability |
VCID-6vxq-uxxw-ybeh |
|
| 7 |
| vulnerability |
VCID-7u2r-egf2-vfhx |
|
| 8 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 9 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 10 |
| vulnerability |
VCID-9vzm-qtye-ufh2 |
|
| 11 |
| vulnerability |
VCID-a9rw-3s1y-hqd7 |
|
| 12 |
| vulnerability |
VCID-apfh-r85v-dbhz |
|
| 13 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 14 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 15 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 16 |
| vulnerability |
VCID-e3jc-83a7-8uhh |
|
| 17 |
| vulnerability |
VCID-eesz-v6ae-gya3 |
|
| 18 |
| vulnerability |
VCID-ehv1-yvpu-ubcg |
|
| 19 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 20 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 25 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 26 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 27 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 28 |
| vulnerability |
VCID-twj7-4qwm-2khv |
|
| 29 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 30 |
| vulnerability |
VCID-v41h-pbbe-zfas |
|
| 31 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 32 |
| vulnerability |
VCID-wshe-gf99-tbg6 |
|
| 33 |
| vulnerability |
VCID-y3k1-c4rn-xbc2 |
|
| 34 |
| vulnerability |
VCID-yz3c-arnr-y3cs |
|
| 35 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.25 |
|
|
| aliases |
CVE-2016-5387
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2xc4-7zg9-y7fw |
|
| 8 |
| url |
VCID-3cea-3rkm-r7gs |
| vulnerability_id |
VCID-3cea-3rkm-r7gs |
| summary |
A flaw was found in the apr_fnmatch() function of the bundled APR library. Where mod_autoindex is enabled, and a directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.
Workaround: Setting the 'IgnoreClient' option to the 'IndexOptions' directive disables processing of the client-supplied request query arguments, preventing this attack.
Resolution: Update APR to release 1.4.5 (bundled with httpd 2.2.19) or release 0.9.20 (bundled with httpd 2.0.65) |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0419 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.97759 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.97735 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.97756 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.97758 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.97741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.97743 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.97745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.9775 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.48782 |
| scoring_system |
epss |
| scoring_elements |
0.97753 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0419 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.19 |
| purl |
pkg:apache/httpd@2.2.19 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-53da-z9gn-n7f2 |
|
| 6 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 7 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 8 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 9 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 10 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 11 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 12 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 13 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 14 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 15 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 16 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 17 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 18 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 19 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 20 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 21 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 22 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 23 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 24 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 25 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 26 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 27 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 28 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 29 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.19 |
|
|
| aliases |
CVE-2011-0419
|
| risk_score |
9.6 |
| exploitability |
2.0 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3cea-3rkm-r7gs |
|
| 9 |
| url |
VCID-3kyb-4yvt-f7e1 |
| vulnerability_id |
VCID-3kyb-4yvt-f7e1 |
| summary |
A denial of service flaw was found in the bundled copy of the APR-util library Extensible Markup Language (XML) parser. A remote attacker could create a specially-crafted XML document that would cause excessive memory consumption when processed by the XML decoding engine. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1955 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.84824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.8475 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.84765 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.84784 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.84785 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.84808 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.84814 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.84833 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02329 |
| scoring_system |
epss |
| scoring_elements |
0.84829 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1955 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.12 |
| purl |
pkg:apache/httpd@2.2.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 14 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 15 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 16 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 17 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 18 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 19 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 25 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 26 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 27 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 28 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 31 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 36 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 37 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 38 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 39 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 40 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 41 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.12 |
|
|
| aliases |
CVE-2009-1955
|
| risk_score |
9.6 |
| exploitability |
2.0 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3kyb-4yvt-f7e1 |
|
| 10 |
| url |
VCID-4zzy-q5zp-jkgm |
| vulnerability_id |
VCID-4zzy-q5zp-jkgm |
| summary |
A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3720 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01541 |
| scoring_system |
epss |
| scoring_elements |
0.81381 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.01541 |
| scoring_system |
epss |
| scoring_elements |
0.8131 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01541 |
| scoring_system |
epss |
| scoring_elements |
0.81319 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01541 |
| scoring_system |
epss |
| scoring_elements |
0.81341 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01541 |
| scoring_system |
epss |
| scoring_elements |
0.81339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01541 |
| scoring_system |
epss |
| scoring_elements |
0.81368 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01541 |
| scoring_system |
epss |
| scoring_elements |
0.81373 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01541 |
| scoring_system |
epss |
| scoring_elements |
0.81394 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3720 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.17 |
| purl |
pkg:apache/httpd@2.2.17 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-53da-z9gn-n7f2 |
|
| 7 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 8 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 9 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 10 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 11 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 12 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 13 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 14 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 15 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 16 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 17 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 18 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 19 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 20 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 21 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 22 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 23 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 24 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 25 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 26 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 27 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 28 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 29 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 30 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.17 |
|
|
| aliases |
CVE-2009-3720
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4zzy-q5zp-jkgm |
|
| 11 |
| url |
VCID-56kt-8bg6-zbcj |
| vulnerability_id |
VCID-56kt-8bg6-zbcj |
| summary |
A flaw was found in the handling of requests by mod_cache (2.2) and mod_dav (2.0 and 2.2). A malicious remote attacker could send a carefully crafted request and cause a httpd child process to crash. This crash would only be a denial of service if using the worker MPM. This issue is further mitigated as mod_dav is only affected by requests that are most likely to be authenticated, and mod_cache is only affected if the uncommon "CacheIgnoreURLSessionIdentifiers" directive, introduced in version 2.2.14, is used. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1452 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.13871 |
| scoring_system |
epss |
| scoring_elements |
0.94299 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.13871 |
| scoring_system |
epss |
| scoring_elements |
0.943 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.15663 |
| scoring_system |
epss |
| scoring_elements |
0.94674 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.15663 |
| scoring_system |
epss |
| scoring_elements |
0.94678 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.15663 |
| scoring_system |
epss |
| scoring_elements |
0.9469 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.15663 |
| scoring_system |
epss |
| scoring_elements |
0.94694 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.15663 |
| scoring_system |
epss |
| scoring_elements |
0.94698 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.15663 |
| scoring_system |
epss |
| scoring_elements |
0.9468 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.15663 |
| scoring_system |
epss |
| scoring_elements |
0.94666 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1452 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.16 |
| purl |
pkg:apache/httpd@2.2.16 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 8 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 9 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 10 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 11 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 12 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 13 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 14 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 15 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 16 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 17 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 18 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 19 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 20 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 21 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 22 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 23 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 24 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 25 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 26 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 27 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 28 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 29 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 30 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 31 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 32 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.16 |
|
|
| aliases |
CVE-2010-1452
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-56kt-8bg6-zbcj |
|
| 12 |
| url |
VCID-5bej-9h7w-33c8 |
| vulnerability_id |
VCID-5bej-9h7w-33c8 |
| summary |
When an unrecognized HTTP Method is given in an <Limit {method}> directive in an .htaccess file, and that .htaccess file is processed by the corresponding request, the global methods table is corrupted in the current worker process, resulting in erratic behaviour. This behavior may be avoided by listing all unusual HTTP Methods in a global httpd.conf RegisterHttpMethod directive in httpd release 2.4.25 and later. To permit other .htaccess directives while denying the <Limit > directive, see the AllowOverrideList directive. Source code patch (2.4) is at; CVE-2017-9798-patch-2.4.patch Source code patch (2.2) is at; CVE-2017-9798-patch-2.2.patch Note 2.2 is end-of-life, no further release with this fix is planned. Users are encouraged to migrate to 2.4.28 or later for this and other fixes. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9798 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.9384 |
| scoring_system |
epss |
| scoring_elements |
0.99862 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.9384 |
| scoring_system |
epss |
| scoring_elements |
0.99865 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.9384 |
| scoring_system |
epss |
| scoring_elements |
0.99864 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.9384 |
| scoring_system |
epss |
| scoring_elements |
0.99863 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9798 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.4.28 |
| purl |
pkg:apache/httpd@2.4.28 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 1 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 2 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 3 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 4 |
| vulnerability |
VCID-6vxq-uxxw-ybeh |
|
| 5 |
| vulnerability |
VCID-7u2r-egf2-vfhx |
|
| 6 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 7 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 8 |
| vulnerability |
VCID-9vzm-qtye-ufh2 |
|
| 9 |
| vulnerability |
VCID-a9rw-3s1y-hqd7 |
|
| 10 |
| vulnerability |
VCID-apfh-r85v-dbhz |
|
| 11 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 12 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 13 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 14 |
| vulnerability |
VCID-e3jc-83a7-8uhh |
|
| 15 |
| vulnerability |
VCID-eesz-v6ae-gya3 |
|
| 16 |
| vulnerability |
VCID-ehv1-yvpu-ubcg |
|
| 17 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 18 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 19 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 20 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 21 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 22 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 23 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 24 |
| vulnerability |
VCID-v41h-pbbe-zfas |
|
| 25 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 26 |
| vulnerability |
VCID-y3k1-c4rn-xbc2 |
|
| 27 |
| vulnerability |
VCID-yz3c-arnr-y3cs |
|
| 28 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.28 |
|
|
| aliases |
CVE-2017-9798
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5bej-9h7w-33c8 |
|
| 13 |
| url |
VCID-5yez-d5nj-q7eq |
| vulnerability_id |
VCID-5yez-d5nj-q7eq |
| summary |
An integer overflow flaw was found which, when the mod_setenvif module is enabled, could allow local users to gain privileges via a .htaccess file. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3607 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47455 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47395 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47429 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.4745 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47399 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47454 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47473 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47448 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3607 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.22 |
| purl |
pkg:apache/httpd@2.2.22 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 6 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 7 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 8 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 9 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 10 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 11 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 12 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 13 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 14 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 15 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 16 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 17 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 18 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 19 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 20 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22 |
|
|
| aliases |
CVE-2011-3607
|
| risk_score |
4.2 |
| exploitability |
2.0 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5yez-d5nj-q7eq |
|
| 14 |
| url |
VCID-699n-tvdd-qkgj |
| vulnerability_id |
VCID-699n-tvdd-qkgj |
| summary |
The recall_headers function in mod_mem_cache in Apache 2.2.4 did not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1862 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.93305 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.93276 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.93306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.93304 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.93284 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.9329 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.93289 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.93297 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.10659 |
| scoring_system |
epss |
| scoring_elements |
0.93302 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-1862 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.6 |
| purl |
pkg:apache/httpd@2.2.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-115r-fep2-fyfm |
|
| 1 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 2 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 3 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 4 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 5 |
| vulnerability |
VCID-2261-sdn2-zbbu |
|
| 6 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 7 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 8 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 9 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 10 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 11 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 12 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 13 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 14 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 15 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 16 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 17 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 18 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 19 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 20 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 21 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 22 |
| vulnerability |
VCID-dqkp-f1my-dbg9 |
|
| 23 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 24 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 25 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 26 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 27 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 28 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 29 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 30 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 31 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 32 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 33 |
| vulnerability |
VCID-kgpj-aexq-7kah |
|
| 34 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 35 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 36 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 37 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 38 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 39 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 40 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 41 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 42 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 43 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 44 |
| vulnerability |
VCID-ss79-kcpu-mqd5 |
|
| 45 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 46 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 47 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 48 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 49 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 50 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 51 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 52 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 53 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6 |
|
|
| aliases |
CVE-2007-1862
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-699n-tvdd-qkgj |
|
| 15 |
| url |
VCID-6bez-sgg8-cbbq |
| vulnerability_id |
VCID-6bez-sgg8-cbbq |
| summary |
Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled. Note: This issue is also known as CVE-2008-0455. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92237 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92204 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.9224 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92241 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92211 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92217 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.9222 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92231 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.08268 |
| scoring_system |
epss |
| scoring_elements |
0.92234 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2687 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.23 |
| purl |
pkg:apache/httpd@2.2.23 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 6 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 7 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 8 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 9 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 10 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 11 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 12 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 13 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 14 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 15 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 16 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 17 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 18 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.23 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.3 |
| purl |
pkg:apache/httpd@2.4.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 5 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 6 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 7 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5qkp-3w54-j3a5 |
|
| 10 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 11 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 14 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 15 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 16 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 17 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 18 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 19 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 20 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 21 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 24 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 25 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 26 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 27 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 28 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 29 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 30 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 31 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-rhwb-4vyp-8kf2 |
|
| 36 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 37 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 38 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 39 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 40 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 41 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.3 |
|
|
| aliases |
CVE-2012-2687
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6bez-sgg8-cbbq |
|
| 16 |
| url |
VCID-6d43-sjqw-tbbp |
| vulnerability_id |
VCID-6d43-sjqw-tbbp |
| summary |
A flaw was found in the mod_proxy_ftp module. In a reverse proxy configuration, a remote attacker could use this flaw to bypass intended access restrictions by creating a carefully-crafted HTTP Authorization header, allowing the attacker to send arbitrary commands to the FTP server. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3095 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86669 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86606 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86617 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86637 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86636 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86655 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86665 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86678 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03037 |
| scoring_system |
epss |
| scoring_elements |
0.86676 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3095 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.14 |
| purl |
pkg:apache/httpd@2.2.14 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 12 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 13 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 14 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 15 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 16 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 17 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 18 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 19 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 20 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 21 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 22 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 23 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 24 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 25 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 26 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 27 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 28 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 29 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 30 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 31 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 32 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 33 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 34 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 35 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 36 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 37 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.14 |
|
|
| aliases |
CVE-2009-3095
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6d43-sjqw-tbbp |
|
| 17 |
| url |
VCID-6pzx-1e5t-xbes |
| vulnerability_id |
VCID-6pzx-1e5t-xbes |
| summary |
XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6438 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.30247 |
| scoring_system |
epss |
| scoring_elements |
0.96681 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.30247 |
| scoring_system |
epss |
| scoring_elements |
0.96648 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.30247 |
| scoring_system |
epss |
| scoring_elements |
0.96657 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.30247 |
| scoring_system |
epss |
| scoring_elements |
0.96663 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.30247 |
| scoring_system |
epss |
| scoring_elements |
0.96666 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.30247 |
| scoring_system |
epss |
| scoring_elements |
0.96674 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.30247 |
| scoring_system |
epss |
| scoring_elements |
0.96676 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.30247 |
| scoring_system |
epss |
| scoring_elements |
0.96678 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6438 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.27 |
| purl |
pkg:apache/httpd@2.2.27 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 2 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 3 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 4 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 5 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 6 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 7 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 8 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 9 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 10 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 11 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 12 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.27 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.9 |
| purl |
pkg:apache/httpd@2.4.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 5 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 6 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 7 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 10 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 11 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 12 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 13 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 14 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 15 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 16 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 17 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 18 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 21 |
| vulnerability |
VCID-gqat-458a-67g2 |
|
| 22 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 25 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 26 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 27 |
| vulnerability |
VCID-m9fd-9pya-xucw |
|
| 28 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 31 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 32 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 33 |
| vulnerability |
VCID-rhwb-4vyp-8kf2 |
|
| 34 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 35 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 36 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 37 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 38 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 39 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.9 |
|
|
| aliases |
CVE-2013-6438
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzx-1e5t-xbes |
|
| 18 |
| url |
VCID-7ftk-sajb-akh4 |
| vulnerability_id |
VCID-7ftk-sajb-akh4 |
| summary |
A heap-based underwrite flaw was found in the way the bundled copy of the APR-util library created compiled forms of particular search patterns. An attacker could formulate a specially-crafted search keyword, that would overwrite arbitrary heap memory locations when processed by the pattern preparation engine. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0023 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.14793 |
| scoring_system |
epss |
| scoring_elements |
0.94504 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.14793 |
| scoring_system |
epss |
| scoring_elements |
0.94469 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.14793 |
| scoring_system |
epss |
| scoring_elements |
0.94476 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.14793 |
| scoring_system |
epss |
| scoring_elements |
0.94483 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.14793 |
| scoring_system |
epss |
| scoring_elements |
0.94485 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.14793 |
| scoring_system |
epss |
| scoring_elements |
0.94495 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.14793 |
| scoring_system |
epss |
| scoring_elements |
0.94499 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.14793 |
| scoring_system |
epss |
| scoring_elements |
0.94502 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0023 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.12 |
| purl |
pkg:apache/httpd@2.2.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 14 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 15 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 16 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 17 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 18 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 19 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 25 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 26 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 27 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 28 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 31 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 36 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 37 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 38 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 39 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 40 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 41 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.12 |
|
|
| aliases |
CVE-2009-0023
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7ftk-sajb-akh4 |
|
| 19 |
| url |
VCID-7krj-8vat-3ydy |
| vulnerability_id |
VCID-7krj-8vat-3ydy |
| summary |
A flaw was found with within mod_isapi which would attempt to unload the ISAPI dll when it encountered various error states. This could leave the callbacks in an undefined state and result in a segfault. On Windows platforms using mod_isapi, a remote attacker could send a malicious request to trigger this issue, and as win32 MPM runs only one process, this would result in a denial of service, and potentially allow arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0425 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.86822 |
| scoring_system |
epss |
| scoring_elements |
0.99427 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.86822 |
| scoring_system |
epss |
| scoring_elements |
0.99421 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.86822 |
| scoring_system |
epss |
| scoring_elements |
0.9942 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.86822 |
| scoring_system |
epss |
| scoring_elements |
0.99422 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.86822 |
| scoring_system |
epss |
| scoring_elements |
0.99423 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.86822 |
| scoring_system |
epss |
| scoring_elements |
0.99424 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.86822 |
| scoring_system |
epss |
| scoring_elements |
0.99426 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0425 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.15 |
| purl |
pkg:apache/httpd@2.2.15 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 12 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 13 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 14 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 15 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 16 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 17 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 18 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 19 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 20 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 21 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 22 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 23 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 24 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 25 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 26 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 27 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 28 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 29 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 30 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 31 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 32 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 33 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 34 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.15 |
|
|
| aliases |
CVE-2010-0425
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7krj-8vat-3ydy |
|
| 20 |
| url |
VCID-7s2y-pvar-qqe3 |
| vulnerability_id |
VCID-7s2y-pvar-qqe3 |
| summary |
Faulty error handling was found affecting Solaris pollset support (Event Port backend) caused by a bug in APR. A remote attacker could trigger this issue on Solaris servers which used prefork or event MPMs, resulting in a denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2699 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92498 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92457 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92463 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92472 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92475 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92487 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92491 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92497 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.08727 |
| scoring_system |
epss |
| scoring_elements |
0.92499 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2699 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.14 |
| purl |
pkg:apache/httpd@2.2.14 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 12 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 13 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 14 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 15 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 16 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 17 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 18 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 19 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 20 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 21 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 22 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 23 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 24 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 25 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 26 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 27 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 28 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 29 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 30 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 31 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 32 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 33 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 34 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 35 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 36 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 37 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.14 |
|
|
| aliases |
CVE-2009-2699
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7s2y-pvar-qqe3 |
|
| 21 |
| url |
VCID-8axm-4anr-27ht |
| vulnerability_id |
VCID-8axm-4anr-27ht |
| summary |
Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1896 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.38555 |
| scoring_system |
epss |
| scoring_elements |
0.97242 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.38555 |
| scoring_system |
epss |
| scoring_elements |
0.97214 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.38555 |
| scoring_system |
epss |
| scoring_elements |
0.97237 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.38555 |
| scoring_system |
epss |
| scoring_elements |
0.9724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.38555 |
| scoring_system |
epss |
| scoring_elements |
0.97219 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.38555 |
| scoring_system |
epss |
| scoring_elements |
0.97225 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.38555 |
| scoring_system |
epss |
| scoring_elements |
0.97226 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.38555 |
| scoring_system |
epss |
| scoring_elements |
0.97236 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1896 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.25 |
| purl |
pkg:apache/httpd@2.2.25 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 2 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 3 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 4 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 5 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 6 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 7 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 8 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 9 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 10 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 11 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 12 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 13 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 14 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.25 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.6 |
| purl |
pkg:apache/httpd@2.4.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 5 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 6 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 7 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5crp-xumw-v7gb |
|
| 10 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 11 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 14 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 15 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 16 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 17 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 18 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 19 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 20 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 21 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 24 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 25 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 26 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 27 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 28 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 29 |
| vulnerability |
VCID-m9fd-9pya-xucw |
|
| 30 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 31 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 32 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 33 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 34 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 35 |
| vulnerability |
VCID-rhwb-4vyp-8kf2 |
|
| 36 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 37 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 38 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 39 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 40 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 41 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.6 |
|
|
| aliases |
CVE-2013-1896
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8axm-4anr-27ht |
|
| 22 |
| url |
VCID-8gcm-7q3n-q7bm |
| vulnerability_id |
VCID-8gcm-7q3n-q7bm |
| summary |
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4975 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.73272 |
| scoring_system |
epss |
| scoring_elements |
0.98788 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.73272 |
| scoring_system |
epss |
| scoring_elements |
0.98789 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.73272 |
| scoring_system |
epss |
| scoring_elements |
0.98791 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.73272 |
| scoring_system |
epss |
| scoring_elements |
0.98793 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.73272 |
| scoring_system |
epss |
| scoring_elements |
0.98792 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.75341 |
| scoring_system |
epss |
| scoring_elements |
0.9888 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.75341 |
| scoring_system |
epss |
| scoring_elements |
0.98876 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.75341 |
| scoring_system |
epss |
| scoring_elements |
0.98878 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4975 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.25 |
| purl |
pkg:apache/httpd@2.4.25 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 3 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 4 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 5 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 6 |
| vulnerability |
VCID-6vxq-uxxw-ybeh |
|
| 7 |
| vulnerability |
VCID-7u2r-egf2-vfhx |
|
| 8 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 9 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 10 |
| vulnerability |
VCID-9vzm-qtye-ufh2 |
|
| 11 |
| vulnerability |
VCID-a9rw-3s1y-hqd7 |
|
| 12 |
| vulnerability |
VCID-apfh-r85v-dbhz |
|
| 13 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 14 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 15 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 16 |
| vulnerability |
VCID-e3jc-83a7-8uhh |
|
| 17 |
| vulnerability |
VCID-eesz-v6ae-gya3 |
|
| 18 |
| vulnerability |
VCID-ehv1-yvpu-ubcg |
|
| 19 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 20 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 25 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 26 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 27 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 28 |
| vulnerability |
VCID-twj7-4qwm-2khv |
|
| 29 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 30 |
| vulnerability |
VCID-v41h-pbbe-zfas |
|
| 31 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 32 |
| vulnerability |
VCID-wshe-gf99-tbg6 |
|
| 33 |
| vulnerability |
VCID-y3k1-c4rn-xbc2 |
|
| 34 |
| vulnerability |
VCID-yz3c-arnr-y3cs |
|
| 35 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.25 |
|
|
| aliases |
CVE-2016-4975
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8gcm-7q3n-q7bm |
|
| 23 |
| url |
VCID-95zk-suqh-j7e7 |
| vulnerability_id |
VCID-95zk-suqh-j7e7 |
| summary |
A flaw was found in the Apache HTTP Server mod_proxy module. On sites where a reverse proxy is configured, a remote attacker could send a carefully crafted request that would cause the Apache child process handling that request to crash. On sites where a forward proxy is configured, an attacker could cause a similar crash if a user could be persuaded to visit a malicious site using the proxy. This could lead to a denial of service if using a threaded Multi-Processing Module. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3847 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.22605 |
| scoring_system |
epss |
| scoring_elements |
0.95845 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.22605 |
| scoring_system |
epss |
| scoring_elements |
0.95813 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.22605 |
| scoring_system |
epss |
| scoring_elements |
0.95822 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.22605 |
| scoring_system |
epss |
| scoring_elements |
0.95831 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.22605 |
| scoring_system |
epss |
| scoring_elements |
0.95833 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.22605 |
| scoring_system |
epss |
| scoring_elements |
0.95841 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.23276 |
| scoring_system |
epss |
| scoring_elements |
0.9595 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.23276 |
| scoring_system |
epss |
| scoring_elements |
0.95948 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3847 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.6 |
| purl |
pkg:apache/httpd@2.2.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-115r-fep2-fyfm |
|
| 1 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 2 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 3 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 4 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 5 |
| vulnerability |
VCID-2261-sdn2-zbbu |
|
| 6 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 7 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 8 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 9 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 10 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 11 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 12 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 13 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 14 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 15 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 16 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 17 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 18 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 19 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 20 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 21 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 22 |
| vulnerability |
VCID-dqkp-f1my-dbg9 |
|
| 23 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 24 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 25 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 26 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 27 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 28 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 29 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 30 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 31 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 32 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 33 |
| vulnerability |
VCID-kgpj-aexq-7kah |
|
| 34 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 35 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 36 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 37 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 38 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 39 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 40 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 41 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 42 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 43 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 44 |
| vulnerability |
VCID-ss79-kcpu-mqd5 |
|
| 45 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 46 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 47 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 48 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 49 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 50 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 51 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 52 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 53 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6 |
|
|
| aliases |
CVE-2007-3847
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-95zk-suqh-j7e7 |
|
| 24 |
| url |
VCID-d4rc-pnv5-6uc8 |
| vulnerability_id |
VCID-d4rc-pnv5-6uc8 |
| summary |
A flaw was found in the default error response for status code 400. This flaw could be used by an attacker to expose "httpOnly" cookies when no custom ErrorDocument is specified. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.55955 |
| scoring_system |
epss |
| scoring_elements |
0.98088 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.55955 |
| scoring_system |
epss |
| scoring_elements |
0.98081 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.55955 |
| scoring_system |
epss |
| scoring_elements |
0.98084 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.55955 |
| scoring_system |
epss |
| scoring_elements |
0.981 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.55955 |
| scoring_system |
epss |
| scoring_elements |
0.98093 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.55955 |
| scoring_system |
epss |
| scoring_elements |
0.98099 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0053 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.22 |
| purl |
pkg:apache/httpd@2.2.22 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 6 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 7 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 8 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 9 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 10 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 11 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 12 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 13 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 14 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 15 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 16 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 17 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 18 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 19 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 20 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22 |
|
|
| aliases |
CVE-2012-0053
|
| risk_score |
9.6 |
| exploitability |
2.0 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d4rc-pnv5-6uc8 |
|
| 25 |
| url |
VCID-dqkp-f1my-dbg9 |
| vulnerability_id |
VCID-dqkp-f1my-dbg9 |
| summary |
A flaw was found in the mod_imagemap module. On sites where mod_imagemap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5000 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.7731 |
| scoring_system |
epss |
| scoring_elements |
0.98975 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.7731 |
| scoring_system |
epss |
| scoring_elements |
0.98968 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.7731 |
| scoring_system |
epss |
| scoring_elements |
0.9897 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.7731 |
| scoring_system |
epss |
| scoring_elements |
0.98972 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.78073 |
| scoring_system |
epss |
| scoring_elements |
0.99015 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.78073 |
| scoring_system |
epss |
| scoring_elements |
0.99012 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.78073 |
| scoring_system |
epss |
| scoring_elements |
0.99013 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.78073 |
| scoring_system |
epss |
| scoring_elements |
0.99014 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-5000 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.8 |
| purl |
pkg:apache/httpd@2.2.8 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 7 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 8 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 9 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 10 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 11 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 12 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 15 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 16 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 17 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 18 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 19 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 24 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 25 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 26 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 27 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 28 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 29 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 30 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 31 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 32 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 33 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 34 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 35 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 36 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 37 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 38 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 39 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 40 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 41 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 42 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 43 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 44 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 45 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 46 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 47 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 48 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8 |
|
|
| aliases |
CVE-2007-5000
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dqkp-f1my-dbg9 |
|
| 26 |
| url |
VCID-ese4-47tg-efbw |
| vulnerability_id |
VCID-ese4-47tg-efbw |
| summary |
Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0883 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.4166 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41584 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41671 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41698 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41626 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41676 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41684 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41707 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00197 |
| scoring_system |
epss |
| scoring_elements |
0.41674 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0883 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.23 |
| purl |
pkg:apache/httpd@2.2.23 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 6 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 7 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 8 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 9 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 10 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 11 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 12 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 13 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 14 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 15 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 16 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 17 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 18 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.23 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.2 |
| purl |
pkg:apache/httpd@2.4.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 5 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 6 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 7 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5qkp-3w54-j3a5 |
|
| 10 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 11 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 12 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 15 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 16 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 17 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 18 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 19 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 20 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 21 |
| vulnerability |
VCID-ehff-j1pz-b7e8 |
|
| 22 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 23 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 24 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 25 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 26 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 27 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 28 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 29 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 30 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 31 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 32 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 33 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 34 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 35 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 36 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 37 |
| vulnerability |
VCID-rhwb-4vyp-8kf2 |
|
| 38 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 39 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 40 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 41 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 42 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 43 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.2 |
|
|
| aliases |
CVE-2012-0883
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ese4-47tg-efbw |
|
| 27 |
| url |
VCID-fn5k-e2jr-6ube |
| vulnerability_id |
VCID-fn5k-e2jr-6ube |
| summary |
A flaw was found in the handling of excessive interim responses from an origin server when using mod_proxy_http. A remote attacker could cause a denial of service or high memory usage. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2364 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84461 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84471 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84465 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84389 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84404 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84426 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84448 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.02213 |
| scoring_system |
epss |
| scoring_elements |
0.84453 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2364 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.9 |
| purl |
pkg:apache/httpd@2.2.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 7 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 8 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 9 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 10 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 11 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 12 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 15 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 16 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 17 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 18 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 19 |
| vulnerability |
VCID-cn4b-1w42-gyda |
|
| 20 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 21 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 22 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 23 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 24 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 25 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 26 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 27 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 28 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 29 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 30 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 31 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 32 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 33 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 34 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 35 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 36 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 37 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 38 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 39 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 40 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 41 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 42 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 43 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 44 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 45 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 46 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 47 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 48 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.9 |
|
|
| aliases |
CVE-2008-2364
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fn5k-e2jr-6ube |
|
| 28 |
| url |
VCID-fyrq-yg2u-jkc7 |
| vulnerability_id |
VCID-fyrq-yg2u-jkc7 |
| summary |
mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7679 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.30062 |
| scoring_system |
epss |
| scoring_elements |
0.96661 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.31057 |
| scoring_system |
epss |
| scoring_elements |
0.96725 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.31057 |
| scoring_system |
epss |
| scoring_elements |
0.96715 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.31057 |
| scoring_system |
epss |
| scoring_elements |
0.9673 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.31057 |
| scoring_system |
epss |
| scoring_elements |
0.96738 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.31057 |
| scoring_system |
epss |
| scoring_elements |
0.96739 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.31057 |
| scoring_system |
epss |
| scoring_elements |
0.96742 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.31057 |
| scoring_system |
epss |
| scoring_elements |
0.96726 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7679 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.26 |
| purl |
pkg:apache/httpd@2.4.26 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 1 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 2 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 3 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 4 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 5 |
| vulnerability |
VCID-6vxq-uxxw-ybeh |
|
| 6 |
| vulnerability |
VCID-7u2r-egf2-vfhx |
|
| 7 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 8 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 9 |
| vulnerability |
VCID-9vzm-qtye-ufh2 |
|
| 10 |
| vulnerability |
VCID-a9rw-3s1y-hqd7 |
|
| 11 |
| vulnerability |
VCID-apfh-r85v-dbhz |
|
| 12 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 13 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 14 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 15 |
| vulnerability |
VCID-e3jc-83a7-8uhh |
|
| 16 |
| vulnerability |
VCID-eesz-v6ae-gya3 |
|
| 17 |
| vulnerability |
VCID-ehv1-yvpu-ubcg |
|
| 18 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 21 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 22 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 23 |
| vulnerability |
VCID-khfr-kgtb-rfam |
|
| 24 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 25 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 26 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 27 |
| vulnerability |
VCID-v41h-pbbe-zfas |
|
| 28 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 29 |
| vulnerability |
VCID-y3k1-c4rn-xbc2 |
|
| 30 |
| vulnerability |
VCID-yz3c-arnr-y3cs |
|
| 31 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.26 |
|
|
| aliases |
CVE-2017-7679
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fyrq-yg2u-jkc7 |
|
| 29 |
| url |
VCID-fysz-5mr6-fbf1 |
| vulnerability_id |
VCID-fysz-5mr6-fbf1 |
| summary |
A denial of service flaw was found in the mod_proxy module when it was used as a reverse proxy. A remote attacker could use this flaw to force a proxy process to consume large amounts of CPU time. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1890 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.3787 |
| scoring_system |
epss |
| scoring_elements |
0.97208 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.3787 |
| scoring_system |
epss |
| scoring_elements |
0.9718 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.3787 |
| scoring_system |
epss |
| scoring_elements |
0.97186 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.3787 |
| scoring_system |
epss |
| scoring_elements |
0.97192 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.3787 |
| scoring_system |
epss |
| scoring_elements |
0.97193 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.3787 |
| scoring_system |
epss |
| scoring_elements |
0.97202 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.3787 |
| scoring_system |
epss |
| scoring_elements |
0.97204 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.3787 |
| scoring_system |
epss |
| scoring_elements |
0.97207 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1890 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.12 |
| purl |
pkg:apache/httpd@2.2.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 14 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 15 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 16 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 17 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 18 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 19 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 25 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 26 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 27 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 28 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 31 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 36 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 37 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 38 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 39 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 40 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 41 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.12 |
|
|
| aliases |
CVE-2009-1890
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fysz-5mr6-fbf1 |
|
| 30 |
| url |
VCID-g2pp-aahn-mfcd |
| vulnerability_id |
VCID-g2pp-aahn-mfcd |
| summary |
A flaw was found in the handling of wildcards in the path of a FTP URL with mod_proxy_ftp. If mod_proxy_ftp is enabled to support FTP-over-HTTP, requests containing globbing characters could lead to cross-site scripting (XSS) attacks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2939 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.6456 |
| scoring_system |
epss |
| scoring_elements |
0.98456 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.6456 |
| scoring_system |
epss |
| scoring_elements |
0.98449 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.6456 |
| scoring_system |
epss |
| scoring_elements |
0.98452 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.6456 |
| scoring_system |
epss |
| scoring_elements |
0.98453 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.6456 |
| scoring_system |
epss |
| scoring_elements |
0.98457 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.71247 |
| scoring_system |
epss |
| scoring_elements |
0.98703 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.71247 |
| scoring_system |
epss |
| scoring_elements |
0.98707 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-2939 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.10 |
| purl |
pkg:apache/httpd@2.2.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 7 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 8 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 9 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 10 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 11 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 12 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 15 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 16 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 17 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 18 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 19 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 20 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 21 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 24 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 25 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 26 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 27 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 28 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 29 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 30 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 31 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 32 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 33 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 34 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 35 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 36 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 37 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 38 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 39 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 40 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 41 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 42 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 43 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 44 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 45 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 46 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.10 |
|
|
| aliases |
CVE-2008-2939
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g2pp-aahn-mfcd |
|
| 31 |
| url |
VCID-gu44-7hkr-muae |
| vulnerability_id |
VCID-gu44-7hkr-muae |
| summary |
An additional exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.81918 |
| scoring_system |
epss |
| scoring_elements |
0.99197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.81918 |
| scoring_system |
epss |
| scoring_elements |
0.99193 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.81918 |
| scoring_system |
epss |
| scoring_elements |
0.99195 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.81918 |
| scoring_system |
epss |
| scoring_elements |
0.99203 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.81918 |
| scoring_system |
epss |
| scoring_elements |
0.99201 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.81918 |
| scoring_system |
epss |
| scoring_elements |
0.99202 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.22 |
| purl |
pkg:apache/httpd@2.2.22 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 6 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 7 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 8 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 9 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 10 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 11 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 12 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 13 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 14 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 15 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 16 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 17 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 18 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 19 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 20 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22 |
|
|
| aliases |
CVE-2011-4317
|
| risk_score |
9.6 |
| exploitability |
2.0 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gu44-7hkr-muae |
|
| 32 |
| url |
VCID-hcjv-md55-3fcr |
| vulnerability_id |
VCID-hcjv-md55-3fcr |
| summary |
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0456 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07199 |
| scoring_system |
epss |
| scoring_elements |
0.91595 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.07199 |
| scoring_system |
epss |
| scoring_elements |
0.91554 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07199 |
| scoring_system |
epss |
| scoring_elements |
0.91561 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07199 |
| scoring_system |
epss |
| scoring_elements |
0.91567 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07199 |
| scoring_system |
epss |
| scoring_elements |
0.91575 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07199 |
| scoring_system |
epss |
| scoring_elements |
0.91588 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07643 |
| scoring_system |
epss |
| scoring_elements |
0.91885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.07643 |
| scoring_system |
epss |
| scoring_elements |
0.91888 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.07643 |
| scoring_system |
epss |
| scoring_elements |
0.91889 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0456 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.12 |
| purl |
pkg:apache/httpd@2.2.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 14 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 15 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 16 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 17 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 18 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 19 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 25 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 26 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 27 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 28 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 31 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 36 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 37 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 38 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 39 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 40 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 41 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.12 |
|
|
| aliases |
CVE-2008-0456
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hcjv-md55-3fcr |
|
| 33 |
| url |
VCID-j3mb-97k1-uuh9 |
| vulnerability_id |
VCID-j3mb-97k1-uuh9 |
| summary |
A flaw was found in the mod_status module. On sites where the server-status page is publicly accessible and ExtendedStatus is enabled this could lead to a cross-site scripting attack. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-5752 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.18368 |
| scoring_system |
epss |
| scoring_elements |
0.95226 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.18368 |
| scoring_system |
epss |
| scoring_elements |
0.95189 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.18368 |
| scoring_system |
epss |
| scoring_elements |
0.95218 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.18368 |
| scoring_system |
epss |
| scoring_elements |
0.95223 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.18368 |
| scoring_system |
epss |
| scoring_elements |
0.95201 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.18368 |
| scoring_system |
epss |
| scoring_elements |
0.95203 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.18368 |
| scoring_system |
epss |
| scoring_elements |
0.95206 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.18368 |
| scoring_system |
epss |
| scoring_elements |
0.95214 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-5752 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.6 |
| purl |
pkg:apache/httpd@2.2.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-115r-fep2-fyfm |
|
| 1 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 2 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 3 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 4 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 5 |
| vulnerability |
VCID-2261-sdn2-zbbu |
|
| 6 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 7 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 8 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 9 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 10 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 11 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 12 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 13 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 14 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 15 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 16 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 17 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 18 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 19 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 20 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 21 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 22 |
| vulnerability |
VCID-dqkp-f1my-dbg9 |
|
| 23 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 24 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 25 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 26 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 27 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 28 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 29 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 30 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 31 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 32 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 33 |
| vulnerability |
VCID-kgpj-aexq-7kah |
|
| 34 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 35 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 36 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 37 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 38 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 39 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 40 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 41 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 42 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 43 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 44 |
| vulnerability |
VCID-ss79-kcpu-mqd5 |
|
| 45 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 46 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 47 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 48 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 49 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 50 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 51 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 52 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 53 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6 |
|
|
| aliases |
CVE-2006-5752
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j3mb-97k1-uuh9 |
|
| 34 |
| url |
VCID-jt89-ruvk-1kbj |
| vulnerability_id |
VCID-jt89-ruvk-1kbj |
| summary |
The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9788 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97921 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97944 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97934 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97937 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97941 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97924 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97926 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.52641 |
| scoring_system |
epss |
| scoring_elements |
0.97929 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9788 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.27 |
| purl |
pkg:apache/httpd@2.4.27 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 1 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 2 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 3 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 4 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 5 |
| vulnerability |
VCID-6vxq-uxxw-ybeh |
|
| 6 |
| vulnerability |
VCID-7u2r-egf2-vfhx |
|
| 7 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 8 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 9 |
| vulnerability |
VCID-9vzm-qtye-ufh2 |
|
| 10 |
| vulnerability |
VCID-a9rw-3s1y-hqd7 |
|
| 11 |
| vulnerability |
VCID-apfh-r85v-dbhz |
|
| 12 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 13 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 14 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 15 |
| vulnerability |
VCID-e3jc-83a7-8uhh |
|
| 16 |
| vulnerability |
VCID-eesz-v6ae-gya3 |
|
| 17 |
| vulnerability |
VCID-ehv1-yvpu-ubcg |
|
| 18 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 21 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 22 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 23 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 24 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 25 |
| vulnerability |
VCID-v41h-pbbe-zfas |
|
| 26 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 27 |
| vulnerability |
VCID-y3k1-c4rn-xbc2 |
|
| 28 |
| vulnerability |
VCID-yz3c-arnr-y3cs |
|
| 29 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.27 |
|
|
| aliases |
CVE-2017-9788
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jt89-ruvk-1kbj |
|
| 35 |
| url |
VCID-k4kb-21tp-4kc8 |
| vulnerability_id |
VCID-k4kb-21tp-4kc8 |
| summary |
An HTTP request smuggling attack was possible due to a bug in parsing of chunked requests. A malicious client could force the server to misinterpret the request length, allowing cache poisoning or credential hijacking if an intermediary proxy is in use. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96477 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96485 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96489 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96494 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96505 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96508 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96511 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3183 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.16 |
| purl |
pkg:apache/httpd@2.4.16 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 3 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 4 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 5 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 6 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 7 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 8 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 9 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 10 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 11 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 12 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 13 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 14 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 15 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 16 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 17 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 18 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 19 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 20 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 21 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 22 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 23 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 24 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 25 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 26 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 27 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 28 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.16 |
|
|
| aliases |
CVE-2015-3183
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k4kb-21tp-4kc8 |
|
| 36 |
| url |
VCID-ke1s-451y-p3cz |
| vulnerability_id |
VCID-ke1s-451y-p3cz |
| summary |
A flaw was found in mod_log_config. A remote attacker could send a specific truncated cookie causing a crash. This crash would only be a denial of service if using a threaded MPM. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0098 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.9738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.97357 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.97363 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.97367 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.97368 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.97375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.97376 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.97378 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.4102 |
| scoring_system |
epss |
| scoring_elements |
0.97379 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0098 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.27 |
| purl |
pkg:apache/httpd@2.2.27 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 2 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 3 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 4 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 5 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 6 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 7 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 8 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 9 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 10 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 11 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 12 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.27 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.9 |
| purl |
pkg:apache/httpd@2.4.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 5 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 6 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 7 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 10 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 11 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 12 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 13 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 14 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 15 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 16 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 17 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 18 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 21 |
| vulnerability |
VCID-gqat-458a-67g2 |
|
| 22 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 25 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 26 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 27 |
| vulnerability |
VCID-m9fd-9pya-xucw |
|
| 28 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 31 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 32 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 33 |
| vulnerability |
VCID-rhwb-4vyp-8kf2 |
|
| 34 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 35 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 36 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 37 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 38 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 39 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.9 |
|
|
| aliases |
CVE-2014-0098
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ke1s-451y-p3cz |
|
| 37 |
| url |
VCID-kgpj-aexq-7kah |
| vulnerability_id |
VCID-kgpj-aexq-7kah |
| summary |
A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6388 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.85047 |
| scoring_system |
epss |
| scoring_elements |
0.99353 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.85047 |
| scoring_system |
epss |
| scoring_elements |
0.99344 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.85047 |
| scoring_system |
epss |
| scoring_elements |
0.99345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.85047 |
| scoring_system |
epss |
| scoring_elements |
0.99347 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.85047 |
| scoring_system |
epss |
| scoring_elements |
0.99348 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.85047 |
| scoring_system |
epss |
| scoring_elements |
0.9935 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.85047 |
| scoring_system |
epss |
| scoring_elements |
0.99352 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6388 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.8 |
| purl |
pkg:apache/httpd@2.2.8 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 7 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 8 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 9 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 10 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 11 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 12 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 15 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 16 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 17 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 18 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 19 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 24 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 25 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 26 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 27 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 28 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 29 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 30 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 31 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 32 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 33 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 34 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 35 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 36 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 37 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 38 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 39 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 40 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 41 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 42 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 43 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 44 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 45 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 46 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 47 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 48 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8 |
|
|
| aliases |
CVE-2007-6388
|
| risk_score |
9.6 |
| exploitability |
2.0 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kgpj-aexq-7kah |
|
| 38 |
| url |
VCID-kkfv-4jd1-bqdm |
| vulnerability_id |
VCID-kkfv-4jd1-bqdm |
| summary |
A flaw was found in the way the Apache HTTP Server handled Range HTTP headers. A remote attacker could use this flaw to cause httpd to use an excessive amount of memory and CPU time via HTTP requests with a specially-crafted Range header. This could be used in a denial of service attack. Advisory: CVE-2011-3192.txt |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3192 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.90456 |
| scoring_system |
epss |
| scoring_elements |
0.99604 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.90456 |
| scoring_system |
epss |
| scoring_elements |
0.99605 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.90456 |
| scoring_system |
epss |
| scoring_elements |
0.99606 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.90456 |
| scoring_system |
epss |
| scoring_elements |
0.99607 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.90456 |
| scoring_system |
epss |
| scoring_elements |
0.99608 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3192 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.20 |
| purl |
pkg:apache/httpd@2.2.20 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-53da-z9gn-n7f2 |
|
| 6 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 7 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 8 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 9 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 10 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 11 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 12 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 13 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 14 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 15 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 16 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 17 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 18 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 19 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 20 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 21 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 22 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 23 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 24 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 25 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 26 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 27 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 28 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.20 |
|
|
| aliases |
CVE-2011-3192
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kkfv-4jd1-bqdm |
|
| 39 |
| url |
VCID-kpew-rarv-83dg |
| vulnerability_id |
VCID-kpew-rarv-83dg |
| summary |
A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0231 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.44151 |
| scoring_system |
epss |
| scoring_elements |
0.97547 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.44151 |
| scoring_system |
epss |
| scoring_elements |
0.97523 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.44151 |
| scoring_system |
epss |
| scoring_elements |
0.97541 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.44151 |
| scoring_system |
epss |
| scoring_elements |
0.97544 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.44151 |
| scoring_system |
epss |
| scoring_elements |
0.9753 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.44151 |
| scoring_system |
epss |
| scoring_elements |
0.97532 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.44151 |
| scoring_system |
epss |
| scoring_elements |
0.97534 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.44151 |
| scoring_system |
epss |
| scoring_elements |
0.97539 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0231 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.10 |
| purl |
pkg:apache/httpd@2.4.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 6 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 7 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 8 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 9 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 10 |
| vulnerability |
VCID-8eqf-c42n-y7dt |
|
| 11 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 12 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 13 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 14 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 15 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 16 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 17 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 18 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 21 |
| vulnerability |
VCID-gqat-458a-67g2 |
|
| 22 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 25 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 26 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 27 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 28 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 29 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 30 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 31 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 32 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 33 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 34 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 35 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.10 |
|
|
| aliases |
CVE-2014-0231
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kpew-rarv-83dg |
|
| 40 |
| url |
VCID-pc2n-ga7g-byga |
| vulnerability_id |
VCID-pc2n-ga7g-byga |
| summary |
Apache HTTP Server, prior to release 2.4.25 (and 2.2.32), accepted a broad pattern of unusual whitespace patterns from the user-agent, including bare CR, FF, VTAB in parsing the request line and request header lines, as well as HTAB in parsing the request line. Any bare CR present in request lines was treated as whitespace and remained in the request field member "the_request", while a bare CR in the request header field name would be honored as whitespace, and a bare CR in the request header field value was retained the input headers array. Implied additional whitespace was accepted in the request line and prior to the ':' delimiter of any request header lines.
RFC7230 Section 3.5 calls out some of these whitespace exceptions, and section 3.2.3 eliminated and clarified the role of implied whitespace in the grammer of this specification. Section 3.1.1 requires exactly one single SP between the method and request-target, and between the request-target and HTTP-version, followed immediately by a CRLF sequence. None of these fields permit any (unencoded) CTL character whatsoever. Section 3.2.4 explicitly disallowed any whitespace from the request header field prior to the ':' character, while Section 3.2 disallows all CTL characters in the request header line other than the HTAB character as whitespace.
These defects represent a security concern when httpd is participating in any chain of proxies or interacting with back-end application servers, either through mod_proxy or using conventional CGI mechanisms. In each case where one agent accepts such CTL characters and does not treat them as whitespace, there is the possiblity in a proxy chain of generating two responses from a server behind the uncautious proxy agent. In a sequence of two requests, this results in request A to the first proxy being interpreted as requests A + A' by the backend server, and if requests A and B were submitted to the first proxy in a keepalive connection, the proxy may interpret response A' as the response to request B, polluting the cache or potentially serving the A' content to a different downstream user-agent.
These defects are addressed with the release of Apache HTTP Server 2.4.25 and coordinated by a new directive; HttpProtocolOptions Strict which is the default behavior of 2.4.25 and later.
By toggling from 'Strict' behavior to 'Unsafe' behavior, some of the restrictions may be relaxed to allow some invalid HTTP/1.1 clients to communicate with the server, but this will reintroduce the possibility of the problems described in this assessment. Note that relaxing the behavior to 'Unsafe' will still not permit raw CTLs other than HTAB (where permitted), but will allow other RFC requirements to not be enforced, such as exactly two SP characters in the request line. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8743 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08406 |
| scoring_system |
epss |
| scoring_elements |
0.92291 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.08406 |
| scoring_system |
epss |
| scoring_elements |
0.9233 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.08406 |
| scoring_system |
epss |
| scoring_elements |
0.92322 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.08406 |
| scoring_system |
epss |
| scoring_elements |
0.92328 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.08406 |
| scoring_system |
epss |
| scoring_elements |
0.92298 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.08406 |
| scoring_system |
epss |
| scoring_elements |
0.92304 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.08406 |
| scoring_system |
epss |
| scoring_elements |
0.92307 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.08406 |
| scoring_system |
epss |
| scoring_elements |
0.92318 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8743 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.25 |
| purl |
pkg:apache/httpd@2.4.25 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 3 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 4 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 5 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 6 |
| vulnerability |
VCID-6vxq-uxxw-ybeh |
|
| 7 |
| vulnerability |
VCID-7u2r-egf2-vfhx |
|
| 8 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 9 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 10 |
| vulnerability |
VCID-9vzm-qtye-ufh2 |
|
| 11 |
| vulnerability |
VCID-a9rw-3s1y-hqd7 |
|
| 12 |
| vulnerability |
VCID-apfh-r85v-dbhz |
|
| 13 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 14 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 15 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 16 |
| vulnerability |
VCID-e3jc-83a7-8uhh |
|
| 17 |
| vulnerability |
VCID-eesz-v6ae-gya3 |
|
| 18 |
| vulnerability |
VCID-ehv1-yvpu-ubcg |
|
| 19 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 20 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 25 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 26 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 27 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 28 |
| vulnerability |
VCID-twj7-4qwm-2khv |
|
| 29 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 30 |
| vulnerability |
VCID-v41h-pbbe-zfas |
|
| 31 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 32 |
| vulnerability |
VCID-wshe-gf99-tbg6 |
|
| 33 |
| vulnerability |
VCID-y3k1-c4rn-xbc2 |
|
| 34 |
| vulnerability |
VCID-yz3c-arnr-y3cs |
|
| 35 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.25 |
|
|
| aliases |
CVE-2016-8743
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pc2n-ga7g-byga |
|
| 41 |
| url |
VCID-pdj3-4txb-vych |
| vulnerability_id |
VCID-pdj3-4txb-vych |
| summary |
A denial of service flaw was found in the mod_deflate module. This module continued to compress large files until compression was complete, even if the network connection that requested the content was closed before compression completed. This would cause mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1891 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95301 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.9526 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95272 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95278 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95283 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95291 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95293 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95298 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95299 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1891 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.12 |
| purl |
pkg:apache/httpd@2.2.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 14 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 15 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 16 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 17 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 18 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 19 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 25 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 26 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 27 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 28 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 31 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 36 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 37 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 38 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 39 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 40 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 41 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.12 |
|
|
| aliases |
CVE-2009-1891
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pdj3-4txb-vych |
|
| 42 |
| url |
VCID-pdtf-5zv7-2qaf |
| vulnerability_id |
VCID-pdtf-5zv7-2qaf |
| summary |
mod_proxy_ajp would return the wrong status code if it encountered an error, causing a backend server to be put into an error state until the retry timeout expired. A remote attacker could send malicious requests to trigger this issue, resulting in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0408 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.96722 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.96691 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.96701 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.96703 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.96707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.96715 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.96717 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.96719 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.30734 |
| scoring_system |
epss |
| scoring_elements |
0.9672 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0408 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.15 |
| purl |
pkg:apache/httpd@2.2.15 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 12 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 13 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 14 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 15 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 16 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 17 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 18 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 19 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 20 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 21 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 22 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 23 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 24 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 25 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 26 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 27 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 28 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 29 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 30 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 31 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 32 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 33 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 34 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.15 |
|
|
| aliases |
CVE-2010-0408
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pdtf-5zv7-2qaf |
|
| 43 |
| url |
VCID-pj4f-awuq-73g6 |
| vulnerability_id |
VCID-pj4f-awuq-73g6 |
| summary |
An off-by-one overflow flaw was found in the way the bundled copy of the APR-util library processed a variable list of arguments. An attacker could provide a specially-crafted string as input for the formatted output conversion routine, which could, on big-endian platforms, potentially lead to the disclosure of sensitive information or a denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1956 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.90145 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.90102 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.90105 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.90117 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.90121 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.90137 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.90143 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.90151 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.05415 |
| scoring_system |
epss |
| scoring_elements |
0.9015 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1956 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.12 |
| purl |
pkg:apache/httpd@2.2.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 14 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 15 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 16 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 17 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 18 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 19 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 25 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 26 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 27 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 28 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 31 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 36 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 37 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 38 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 39 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 40 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 41 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.12 |
|
|
| aliases |
CVE-2009-1956
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pj4f-awuq-73g6 |
|
| 44 |
| url |
VCID-prd8-51a5-pygj |
| vulnerability_id |
VCID-prd8-51a5-pygj |
| summary |
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released.
Patches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/ |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3368 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.79136 |
| scoring_system |
epss |
| scoring_elements |
0.99065 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.79136 |
| scoring_system |
epss |
| scoring_elements |
0.99054 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.79136 |
| scoring_system |
epss |
| scoring_elements |
0.99055 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.79136 |
| scoring_system |
epss |
| scoring_elements |
0.99059 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.79136 |
| scoring_system |
epss |
| scoring_elements |
0.99062 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.79136 |
| scoring_system |
epss |
| scoring_elements |
0.99063 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.79136 |
| scoring_system |
epss |
| scoring_elements |
0.99064 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3368 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.22 |
| purl |
pkg:apache/httpd@2.2.22 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 6 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 7 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 8 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 9 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 10 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 11 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 12 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 13 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 14 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 15 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 16 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 17 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 18 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 19 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 20 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22 |
|
|
| aliases |
CVE-2011-3368
|
| risk_score |
9.6 |
| exploitability |
2.0 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-prd8-51a5-pygj |
|
| 45 |
| url |
VCID-qayj-kts9-3fde |
| vulnerability_id |
VCID-qayj-kts9-3fde |
| summary |
Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. Third-party module writers SHOULD use ap_get_basic_auth_components(), available in 2.2.34 and 2.4.26, instead of ap_get_basic_auth_pw(). Modules which call the legacy ap_get_basic_auth_pw() during the authentication phase MUST either immediately authenticate the user after the call, or else stop the request immediately with an error response, to avoid incorrectly authenticating the current request. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.93162 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.93191 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.93183 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.93187 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.93192 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.9319 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.93172 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.93176 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.10349 |
| scoring_system |
epss |
| scoring_elements |
0.93174 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3167 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.26 |
| purl |
pkg:apache/httpd@2.4.26 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 1 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 2 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 3 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 4 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 5 |
| vulnerability |
VCID-6vxq-uxxw-ybeh |
|
| 6 |
| vulnerability |
VCID-7u2r-egf2-vfhx |
|
| 7 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 8 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 9 |
| vulnerability |
VCID-9vzm-qtye-ufh2 |
|
| 10 |
| vulnerability |
VCID-a9rw-3s1y-hqd7 |
|
| 11 |
| vulnerability |
VCID-apfh-r85v-dbhz |
|
| 12 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 13 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 14 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 15 |
| vulnerability |
VCID-e3jc-83a7-8uhh |
|
| 16 |
| vulnerability |
VCID-eesz-v6ae-gya3 |
|
| 17 |
| vulnerability |
VCID-ehv1-yvpu-ubcg |
|
| 18 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 21 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 22 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 23 |
| vulnerability |
VCID-khfr-kgtb-rfam |
|
| 24 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 25 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 26 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 27 |
| vulnerability |
VCID-v41h-pbbe-zfas |
|
| 28 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 29 |
| vulnerability |
VCID-y3k1-c4rn-xbc2 |
|
| 30 |
| vulnerability |
VCID-yz3c-arnr-y3cs |
|
| 31 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.26 |
|
|
| aliases |
CVE-2017-3167
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qayj-kts9-3fde |
|
| 46 |
| url |
VCID-qtav-hqnd-b7fa |
| vulnerability_id |
VCID-qtav-hqnd-b7fa |
| summary |
A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3560 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0283 |
| scoring_system |
epss |
| scoring_elements |
0.86182 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.0283 |
| scoring_system |
epss |
| scoring_elements |
0.86111 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0283 |
| scoring_system |
epss |
| scoring_elements |
0.86121 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0283 |
| scoring_system |
epss |
| scoring_elements |
0.86137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0283 |
| scoring_system |
epss |
| scoring_elements |
0.86156 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0283 |
| scoring_system |
epss |
| scoring_elements |
0.86168 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03311 |
| scoring_system |
epss |
| scoring_elements |
0.87253 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.03311 |
| scoring_system |
epss |
| scoring_elements |
0.87257 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3560 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.17 |
| purl |
pkg:apache/httpd@2.2.17 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-53da-z9gn-n7f2 |
|
| 7 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 8 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 9 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 10 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 11 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 12 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 13 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 14 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 15 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 16 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 17 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 18 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 19 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 20 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 21 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 22 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 23 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 24 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 25 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 26 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 27 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 28 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 29 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 30 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.17 |
|
|
| aliases |
CVE-2009-3560
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qtav-hqnd-b7fa |
|
| 47 |
| url |
VCID-rhk3-ujc1-q7fj |
| vulnerability_id |
VCID-rhk3-ujc1-q7fj |
| summary |
Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3499 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10341 |
| scoring_system |
epss |
| scoring_elements |
0.93186 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.10341 |
| scoring_system |
epss |
| scoring_elements |
0.93158 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.10341 |
| scoring_system |
epss |
| scoring_elements |
0.93183 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.10341 |
| scoring_system |
epss |
| scoring_elements |
0.93188 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.10341 |
| scoring_system |
epss |
| scoring_elements |
0.93168 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.10341 |
| scoring_system |
epss |
| scoring_elements |
0.93172 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.10341 |
| scoring_system |
epss |
| scoring_elements |
0.9317 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.10341 |
| scoring_system |
epss |
| scoring_elements |
0.93179 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3499 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.24 |
| purl |
pkg:apache/httpd@2.2.24 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 2 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 3 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 4 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 5 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 6 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 7 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 8 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 9 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 10 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 11 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 12 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 13 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 14 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.24 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.4 |
| purl |
pkg:apache/httpd@2.4.4 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 5 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 6 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 7 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5qkp-3w54-j3a5 |
|
| 10 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 11 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 14 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 15 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 16 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 17 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 18 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 19 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 20 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 21 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 24 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 25 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 26 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 27 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 28 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 29 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 30 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 31 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 34 |
| vulnerability |
VCID-rhwb-4vyp-8kf2 |
|
| 35 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 36 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 37 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 38 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 39 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.4 |
|
|
| aliases |
CVE-2012-3499
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhk3-ujc1-q7fj |
|
| 48 |
| url |
VCID-srxw-jjvr-p3d5 |
| vulnerability_id |
VCID-srxw-jjvr-p3d5 |
| summary |
The Apache HTTP server did not verify that a process was an Apache child process before sending it signals. A local attacker with the ability to run scripts on the HTTP server could manipulate the scoreboard and cause arbitrary processes to be terminated which could lead to a denial of service. |
| references |
| 0 |
| reference_url |
ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3304 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26977 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27078 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27034 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27133 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27169 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26961 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27029 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27075 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3304 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.6 |
| purl |
pkg:apache/httpd@2.2.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-115r-fep2-fyfm |
|
| 1 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 2 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 3 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 4 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 5 |
| vulnerability |
VCID-2261-sdn2-zbbu |
|
| 6 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 7 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 8 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 9 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 10 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 11 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 12 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 13 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 14 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 15 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 16 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 17 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 18 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 19 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 20 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 21 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 22 |
| vulnerability |
VCID-dqkp-f1my-dbg9 |
|
| 23 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 24 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 25 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 26 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 27 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 28 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 29 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 30 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 31 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 32 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 33 |
| vulnerability |
VCID-kgpj-aexq-7kah |
|
| 34 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 35 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 36 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 37 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 38 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 39 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 40 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 41 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 42 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 43 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 44 |
| vulnerability |
VCID-ss79-kcpu-mqd5 |
|
| 45 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 46 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 47 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 48 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 49 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 50 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 51 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 52 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 53 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.6 |
|
|
| aliases |
CVE-2007-3304
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-srxw-jjvr-p3d5 |
|
| 49 |
| url |
VCID-ss79-kcpu-mqd5 |
| vulnerability_id |
VCID-ss79-kcpu-mqd5 |
| summary |
A workaround was added in the mod_proxy_ftp module. On sites where mod_proxy_ftp is enabled and a forward proxy is configured, a cross-site scripting attack is possible against Web browsers which do not correctly derive the response character set following the rules in RFC 2616. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0005 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85758 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85683 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85695 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85713 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.8572 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85739 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.8575 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85765 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0265 |
| scoring_system |
epss |
| scoring_elements |
0.85761 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-0005 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.8 |
| purl |
pkg:apache/httpd@2.2.8 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 7 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 8 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 9 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 10 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 11 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 12 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 15 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 16 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 17 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 18 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 19 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fn5k-e2jr-6ube |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 24 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 25 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 26 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 27 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 28 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 29 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 30 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 31 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 32 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 33 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 34 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 35 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 36 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 37 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 38 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 39 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 40 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 41 |
| vulnerability |
VCID-svyk-az69-qbfw |
|
| 42 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 43 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 44 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 45 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 46 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 47 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 48 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8 |
|
|
| aliases |
CVE-2008-0005
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ss79-kcpu-mqd5 |
|
| 50 |
| url |
VCID-ssvj-7g27-1ug6 |
| vulnerability_id |
VCID-ssvj-7g27-1ug6 |
| summary |
A XSS flaw affected the mod_proxy_balancer manager interface. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4558 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.28235 |
| scoring_system |
epss |
| scoring_elements |
0.96502 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.28235 |
| scoring_system |
epss |
| scoring_elements |
0.96466 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.28235 |
| scoring_system |
epss |
| scoring_elements |
0.96495 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.28235 |
| scoring_system |
epss |
| scoring_elements |
0.96499 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.28235 |
| scoring_system |
epss |
| scoring_elements |
0.96475 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.28235 |
| scoring_system |
epss |
| scoring_elements |
0.9648 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.28235 |
| scoring_system |
epss |
| scoring_elements |
0.96484 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.28235 |
| scoring_system |
epss |
| scoring_elements |
0.96492 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4558 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.24 |
| purl |
pkg:apache/httpd@2.2.24 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 2 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 3 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 4 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 5 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 6 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 7 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 8 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 9 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 10 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 11 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 12 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 13 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 14 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.24 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.4 |
| purl |
pkg:apache/httpd@2.4.4 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 5 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 6 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 7 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5qkp-3w54-j3a5 |
|
| 10 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 11 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 14 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 15 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 16 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 17 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 18 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 19 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 20 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 21 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 22 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 23 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 24 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 25 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 26 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 27 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 28 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 29 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 30 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 31 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 34 |
| vulnerability |
VCID-rhwb-4vyp-8kf2 |
|
| 35 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 36 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 37 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 38 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 39 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.4 |
|
|
| aliases |
CVE-2012-4558
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ssvj-7g27-1ug6 |
|
| 51 |
| url |
VCID-svyk-az69-qbfw |
| vulnerability_id |
VCID-svyk-az69-qbfw |
| summary |
The mod_proxy_balancer provided an administrative interface that could be vulnerable to cross-site request forgery (CSRF) attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6420 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90268 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90223 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90226 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90239 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90266 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90274 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.05544 |
| scoring_system |
epss |
| scoring_elements |
0.90273 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6420 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.9 |
| purl |
pkg:apache/httpd@2.2.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-3kyb-4yvt-f7e1 |
|
| 7 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 8 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 9 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 10 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 11 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 12 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 13 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 14 |
| vulnerability |
VCID-7ftk-sajb-akh4 |
|
| 15 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 16 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 17 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 18 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 19 |
| vulnerability |
VCID-cn4b-1w42-gyda |
|
| 20 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 21 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 22 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 23 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 24 |
| vulnerability |
VCID-fysz-5mr6-fbf1 |
|
| 25 |
| vulnerability |
VCID-g2pp-aahn-mfcd |
|
| 26 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 27 |
| vulnerability |
VCID-hcjv-md55-3fcr |
|
| 28 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 29 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 30 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 31 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 32 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 33 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 34 |
| vulnerability |
VCID-pdj3-4txb-vych |
|
| 35 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 36 |
| vulnerability |
VCID-pj4f-awuq-73g6 |
|
| 37 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 38 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 39 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 40 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 41 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 42 |
| vulnerability |
VCID-t95h-xhtm-zbdv |
|
| 43 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 44 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 45 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 46 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 47 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 48 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.9 |
|
|
| aliases |
CVE-2007-6420
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-svyk-az69-qbfw |
|
| 52 |
| url |
VCID-t95h-xhtm-zbdv |
| vulnerability_id |
VCID-t95h-xhtm-zbdv |
| summary |
A flaw was found in the handling of the "Options" and "AllowOverride" directives. In configurations using the "AllowOverride" directive with certain "Options=" arguments, local users were not restricted from executing commands from a Server-Side-Include script as intended. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40735 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40677 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.4076 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40788 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40712 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40762 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40769 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40754 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1195 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.12 |
| purl |
pkg:apache/httpd@2.2.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 14 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 15 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 16 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 17 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 18 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 19 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 25 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 26 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 27 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 28 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 31 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 36 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 37 |
| vulnerability |
VCID-umuk-3n1q-3qet |
|
| 38 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 39 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 40 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 41 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.12 |
|
|
| aliases |
CVE-2009-1195
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t95h-xhtm-zbdv |
|
| 53 |
| url |
VCID-tbud-pwyt-aye9 |
| vulnerability_id |
VCID-tbud-pwyt-aye9 |
| summary |
A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.75444 |
| scoring_system |
epss |
| scoring_elements |
0.98892 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.75444 |
| scoring_system |
epss |
| scoring_elements |
0.98882 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.75444 |
| scoring_system |
epss |
| scoring_elements |
0.98889 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.75444 |
| scoring_system |
epss |
| scoring_elements |
0.98891 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.75444 |
| scoring_system |
epss |
| scoring_elements |
0.98884 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.75444 |
| scoring_system |
epss |
| scoring_elements |
0.98885 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.75444 |
| scoring_system |
epss |
| scoring_elements |
0.98888 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0226 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:apache/httpd@2.4.10 |
| purl |
pkg:apache/httpd@2.4.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-17hy-4ppt-xyhw |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-2nmh-7tfa-zyb2 |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3djp-gq4c-1fa9 |
|
| 6 |
| vulnerability |
VCID-3wuk-hwg1-6fa6 |
|
| 7 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 8 |
| vulnerability |
VCID-5xrt-1n1q-4bey |
|
| 9 |
| vulnerability |
VCID-66k7-maf9-dfcd |
|
| 10 |
| vulnerability |
VCID-8eqf-c42n-y7dt |
|
| 11 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 12 |
| vulnerability |
VCID-91u7-vh6n-v7fm |
|
| 13 |
| vulnerability |
VCID-9qdr-1v39-d7b7 |
|
| 14 |
| vulnerability |
VCID-auhk-ppv5-buaa |
|
| 15 |
| vulnerability |
VCID-bvkg-nrwd-e7g8 |
|
| 16 |
| vulnerability |
VCID-ct26-19cq-8kd7 |
|
| 17 |
| vulnerability |
VCID-f2y3-s6j8-7ygr |
|
| 18 |
| vulnerability |
VCID-fnxp-n271-mfd8 |
|
| 19 |
| vulnerability |
VCID-fqem-96w3-rucb |
|
| 20 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 21 |
| vulnerability |
VCID-gqat-458a-67g2 |
|
| 22 |
| vulnerability |
VCID-h6kk-81jx-h7b8 |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-jzuw-73df-mfff |
|
| 25 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 26 |
| vulnerability |
VCID-nb91-camp-eufc |
|
| 27 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 28 |
| vulnerability |
VCID-q5wm-suxb-jfeb |
|
| 29 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 30 |
| vulnerability |
VCID-rfqy-e7pv-dyfy |
|
| 31 |
| vulnerability |
VCID-scf1-zmu7-e3b2 |
|
| 32 |
| vulnerability |
VCID-uwqg-yytc-vfae |
|
| 33 |
| vulnerability |
VCID-w6p6-u8ku-k3f6 |
|
| 34 |
| vulnerability |
VCID-wgte-97r1-j7a9 |
|
| 35 |
| vulnerability |
VCID-zc2p-sfu7-jkhc |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.10 |
|
|
| aliases |
CVE-2014-0226
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tbud-pwyt-aye9 |
|
| 54 |
| url |
VCID-umuk-3n1q-3qet |
| vulnerability_id |
VCID-umuk-3n1q-3qet |
| summary |
A flaw in apr_palloc() in the bundled copy of APR could cause heap overflows in programs that try to apr_palloc() a user controlled size. The Apache HTTP Server itself does not pass unsanitized user-provided sizes to this function, so it could only be triggered through some other application which uses apr_palloc() in a vulnerable way. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2412 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91943 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91904 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91912 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.9192 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91926 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91939 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91944 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91947 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2412 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.13 |
| purl |
pkg:apache/httpd@2.2.13 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6d43-sjqw-tbbp |
|
| 12 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 13 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 14 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 15 |
| vulnerability |
VCID-7s2y-pvar-qqe3 |
|
| 16 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 17 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 18 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 19 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 20 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 21 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 22 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 23 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 24 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 25 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 26 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 27 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 28 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 29 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 30 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 31 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 32 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 33 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 34 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 35 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 36 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 37 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 38 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 39 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
| 40 |
| vulnerability |
VCID-zkbr-1m2z-ufe7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.13 |
|
|
| aliases |
CVE-2009-2412
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-umuk-3n1q-3qet |
|
| 55 |
| url |
VCID-wycq-jwzz-q7hf |
| vulnerability_id |
VCID-wycq-jwzz-q7hf |
| summary |
A flaw in the core subrequest process code was fixed, to always provide a shallow copy of the headers_in array to the subrequest, instead of a pointer to the parent request's array as it had for requests without request bodies. This meant all modules such as mod_headers which may manipulate the input headers for a subrequest would poison the parent request in two ways, one by modifying the parent request, which might not be intended, and second by leaving pointers to modified header fields in memory allocated to the subrequest scope, which could be freed before the main request processing was finished, resulting in a segfault or in revealing data from another request on threaded servers, such as the worker or winnt MPMs. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0434 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.85501 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.85428 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.8544 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.8546 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.85463 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.85484 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.85492 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.85506 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02554 |
| scoring_system |
epss |
| scoring_elements |
0.85504 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0434 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.15 |
| purl |
pkg:apache/httpd@2.2.15 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 12 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 13 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 14 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 15 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 16 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 17 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 18 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 19 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 20 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 21 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 22 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 23 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 24 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 25 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 26 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 27 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 28 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 29 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 30 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 31 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 32 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 33 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 34 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.15 |
|
|
| aliases |
CVE-2010-0434
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wycq-jwzz-q7hf |
|
| 56 |
| url |
VCID-y8nd-7h3r-7fh5 |
| vulnerability_id |
VCID-y8nd-7h3r-7fh5 |
| summary |
A flaw was found in the apr_brigade_split_line() function of the bundled APR-util library, used to process non-SSL requests. A remote attacker could send requests, carefully crafting the timing of individual bytes, which would slowly consume memory, potentially leading to a denial of service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1623 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.30774 |
| scoring_system |
epss |
| scoring_elements |
0.96721 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.30774 |
| scoring_system |
epss |
| scoring_elements |
0.96696 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.30774 |
| scoring_system |
epss |
| scoring_elements |
0.96724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.30774 |
| scoring_system |
epss |
| scoring_elements |
0.96706 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.30774 |
| scoring_system |
epss |
| scoring_elements |
0.96708 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.30774 |
| scoring_system |
epss |
| scoring_elements |
0.96712 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.30774 |
| scoring_system |
epss |
| scoring_elements |
0.9672 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.32649 |
| scoring_system |
epss |
| scoring_elements |
0.96867 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.32649 |
| scoring_system |
epss |
| scoring_elements |
0.96866 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1623 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.17 |
| purl |
pkg:apache/httpd@2.2.17 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-53da-z9gn-n7f2 |
|
| 7 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 8 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 9 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 10 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 11 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 12 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 13 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 14 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 15 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 16 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 17 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 18 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 19 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 20 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 21 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 22 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 23 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 24 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 25 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 26 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 27 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 28 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 29 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 30 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.17 |
|
|
| aliases |
CVE-2010-1623
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y8nd-7h3r-7fh5 |
|
| 57 |
| url |
VCID-ym93-sxb8-fkdm |
| vulnerability_id |
VCID-ym93-sxb8-fkdm |
| summary |
A flaw was found in the handling of the scoreboard. An unprivileged child process could cause the parent process to crash at shutdown rather than terminate cleanly. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0031 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78884 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78837 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78843 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78872 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78854 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78879 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78886 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78909 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01196 |
| scoring_system |
epss |
| scoring_elements |
0.78893 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0031 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.22 |
| purl |
pkg:apache/httpd@2.2.22 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 6 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 7 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 8 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 9 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 10 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 11 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 12 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 13 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 14 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 15 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 16 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 17 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 18 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 19 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 20 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22 |
|
|
| aliases |
CVE-2012-0031
|
| risk_score |
4.2 |
| exploitability |
2.0 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ym93-sxb8-fkdm |
|
| 58 |
| url |
VCID-zkbr-1m2z-ufe7 |
| vulnerability_id |
VCID-zkbr-1m2z-ufe7 |
| summary |
A NULL pointer dereference flaw was found in the mod_proxy_ftp module. A malicious FTP server to which requests are being proxied could use this flaw to crash an httpd child process via a malformed reply to the EPSV or PASV commands, resulting in a limited denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3094 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02833 |
| scoring_system |
epss |
| scoring_elements |
0.86183 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.02833 |
| scoring_system |
epss |
| scoring_elements |
0.86118 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02833 |
| scoring_system |
epss |
| scoring_elements |
0.86128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02833 |
| scoring_system |
epss |
| scoring_elements |
0.86144 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02833 |
| scoring_system |
epss |
| scoring_elements |
0.86163 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02833 |
| scoring_system |
epss |
| scoring_elements |
0.86175 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02833 |
| scoring_system |
epss |
| scoring_elements |
0.86189 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02833 |
| scoring_system |
epss |
| scoring_elements |
0.86187 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-3094 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:apache/httpd@2.2.14 |
| purl |
pkg:apache/httpd@2.2.14 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1189-ej89-hybs |
|
| 1 |
| vulnerability |
VCID-1bv2-mkj8-ubaz |
|
| 2 |
| vulnerability |
VCID-1d24-sy5z-jfhh |
|
| 3 |
| vulnerability |
VCID-1zk6-7wv2-ukcz |
|
| 4 |
| vulnerability |
VCID-2xc4-7zg9-y7fw |
|
| 5 |
| vulnerability |
VCID-3cea-3rkm-r7gs |
|
| 6 |
| vulnerability |
VCID-4zzy-q5zp-jkgm |
|
| 7 |
| vulnerability |
VCID-56kt-8bg6-zbcj |
|
| 8 |
| vulnerability |
VCID-5bej-9h7w-33c8 |
|
| 9 |
| vulnerability |
VCID-5yez-d5nj-q7eq |
|
| 10 |
| vulnerability |
VCID-6bez-sgg8-cbbq |
|
| 11 |
| vulnerability |
VCID-6pzx-1e5t-xbes |
|
| 12 |
| vulnerability |
VCID-6vze-zk58-7yep |
|
| 13 |
| vulnerability |
VCID-7krj-8vat-3ydy |
|
| 14 |
| vulnerability |
VCID-8axm-4anr-27ht |
|
| 15 |
| vulnerability |
VCID-8gcm-7q3n-q7bm |
|
| 16 |
| vulnerability |
VCID-d4rc-pnv5-6uc8 |
|
| 17 |
| vulnerability |
VCID-drp9-bvkd-4kaq |
|
| 18 |
| vulnerability |
VCID-ese4-47tg-efbw |
|
| 19 |
| vulnerability |
VCID-fyrq-yg2u-jkc7 |
|
| 20 |
| vulnerability |
VCID-gu44-7hkr-muae |
|
| 21 |
| vulnerability |
VCID-jt89-ruvk-1kbj |
|
| 22 |
| vulnerability |
VCID-k4kb-21tp-4kc8 |
|
| 23 |
| vulnerability |
VCID-ke1s-451y-p3cz |
|
| 24 |
| vulnerability |
VCID-kkfv-4jd1-bqdm |
|
| 25 |
| vulnerability |
VCID-kpew-rarv-83dg |
|
| 26 |
| vulnerability |
VCID-n9e1-c2zs-zkdk |
|
| 27 |
| vulnerability |
VCID-pc2n-ga7g-byga |
|
| 28 |
| vulnerability |
VCID-pdtf-5zv7-2qaf |
|
| 29 |
| vulnerability |
VCID-prd8-51a5-pygj |
|
| 30 |
| vulnerability |
VCID-qayj-kts9-3fde |
|
| 31 |
| vulnerability |
VCID-qtav-hqnd-b7fa |
|
| 32 |
| vulnerability |
VCID-rhk3-ujc1-q7fj |
|
| 33 |
| vulnerability |
VCID-ssvj-7g27-1ug6 |
|
| 34 |
| vulnerability |
VCID-tbud-pwyt-aye9 |
|
| 35 |
| vulnerability |
VCID-wycq-jwzz-q7hf |
|
| 36 |
| vulnerability |
VCID-y8nd-7h3r-7fh5 |
|
| 37 |
| vulnerability |
VCID-ym93-sxb8-fkdm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.14 |
|
|
| aliases |
CVE-2009-3094
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zkbr-1m2z-ufe7 |
|