Lookup for vulnerable packages by Package URL.

Purlpkg:apache/httpd@1.3.41
Typeapache
Namespace
Namehttpd
Version1.3.41
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.0.65
Latest_non_vulnerable_version2.4.54
Affected_by_vulnerabilities
0
url VCID-123w-f3zc-37d9
vulnerability_id VCID-123w-f3zc-37d9
summary An incorrect conversion between numeric types flaw was found in the mod_proxy module which affects some 64-bit architecture systems. A malicious HTTP server to which requests are being proxied could use this flaw to trigger a heap buffer overflow in an httpd child process via a carefully crafted response.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0010
reference_id
reference_type
scores
0
value 0.47445
scoring_system epss
scoring_elements 0.97707
published_at 2026-04-24T12:55:00Z
1
value 0.47445
scoring_system epss
scoring_elements 0.97677
published_at 2026-04-01T12:55:00Z
2
value 0.47445
scoring_system epss
scoring_elements 0.97683
published_at 2026-04-02T12:55:00Z
3
value 0.47445
scoring_system epss
scoring_elements 0.97684
published_at 2026-04-04T12:55:00Z
4
value 0.47445
scoring_system epss
scoring_elements 0.97685
published_at 2026-04-07T12:55:00Z
5
value 0.47445
scoring_system epss
scoring_elements 0.97689
published_at 2026-04-08T12:55:00Z
6
value 0.47445
scoring_system epss
scoring_elements 0.97692
published_at 2026-04-09T12:55:00Z
7
value 0.47445
scoring_system epss
scoring_elements 0.97695
published_at 2026-04-11T12:55:00Z
8
value 0.47445
scoring_system epss
scoring_elements 0.97697
published_at 2026-04-12T12:55:00Z
9
value 0.47445
scoring_system epss
scoring_elements 0.97698
published_at 2026-04-13T12:55:00Z
10
value 0.47445
scoring_system epss
scoring_elements 0.97704
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0010
1
reference_url https://httpd.apache.org/security/json/CVE-2010-0010.json
reference_id CVE-2010-0010
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2010-0010.json
fixed_packages
0
url pkg:apache/httpd@1.3.42
purl pkg:apache/httpd@1.3.42
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.42
aliases CVE-2010-0010
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-123w-f3zc-37d9
1
url VCID-prd8-51a5-pygj
vulnerability_id VCID-prd8-51a5-pygj
summary
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released.
Patches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
reference_id
reference_type
scores
0
value 0.79136
scoring_system epss
scoring_elements 0.99071
published_at 2026-04-24T12:55:00Z
1
value 0.79136
scoring_system epss
scoring_elements 0.99054
published_at 2026-04-01T12:55:00Z
2
value 0.79136
scoring_system epss
scoring_elements 0.99055
published_at 2026-04-02T12:55:00Z
3
value 0.79136
scoring_system epss
scoring_elements 0.99059
published_at 2026-04-04T12:55:00Z
4
value 0.79136
scoring_system epss
scoring_elements 0.99062
published_at 2026-04-07T12:55:00Z
5
value 0.79136
scoring_system epss
scoring_elements 0.99063
published_at 2026-04-08T12:55:00Z
6
value 0.79136
scoring_system epss
scoring_elements 0.99064
published_at 2026-04-11T12:55:00Z
7
value 0.79136
scoring_system epss
scoring_elements 0.99065
published_at 2026-04-13T12:55:00Z
8
value 0.79136
scoring_system epss
scoring_elements 0.99066
published_at 2026-04-16T12:55:00Z
9
value 0.79136
scoring_system epss
scoring_elements 0.99067
published_at 2026-04-18T12:55:00Z
10
value 0.79136
scoring_system epss
scoring_elements 0.99069
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=740045
reference_id 740045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=740045
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3368.json
reference_id CVE-2011-3368
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3368.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
reference_id CVE-2011-3368;OSVDB-76079
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
6
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
7
reference_url https://access.redhat.com/errata/RHSA-2011:1391
reference_id RHSA-2011:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1391
8
reference_url https://access.redhat.com/errata/RHSA-2011:1392
reference_id RHSA-2011:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1392
9
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
10
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
11
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:apache/httpd@2.0.65
purl pkg:apache/httpd@2.0.65
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.65
1
url pkg:apache/httpd@2.2.22
purl pkg:apache/httpd@2.2.22
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-5bej-9h7w-33c8
6
vulnerability VCID-6bez-sgg8-cbbq
7
vulnerability VCID-6pzx-1e5t-xbes
8
vulnerability VCID-8axm-4anr-27ht
9
vulnerability VCID-8gcm-7q3n-q7bm
10
vulnerability VCID-ese4-47tg-efbw
11
vulnerability VCID-fyrq-yg2u-jkc7
12
vulnerability VCID-jt89-ruvk-1kbj
13
vulnerability VCID-k4kb-21tp-4kc8
14
vulnerability VCID-ke1s-451y-p3cz
15
vulnerability VCID-kpew-rarv-83dg
16
vulnerability VCID-pc2n-ga7g-byga
17
vulnerability VCID-qayj-kts9-3fde
18
vulnerability VCID-rhk3-ujc1-q7fj
19
vulnerability VCID-ssvj-7g27-1ug6
20
vulnerability VCID-tbud-pwyt-aye9
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22
aliases CVE-2011-3368
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prd8-51a5-pygj
Fixing_vulnerabilities
0
url VCID-dqkp-f1my-dbg9
vulnerability_id VCID-dqkp-f1my-dbg9
summary A flaw was found in the mod_imagemap module. On sites where mod_imagemap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5000.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-5000
reference_id
reference_type
scores
0
value 0.7731
scoring_system epss
scoring_elements 0.98972
published_at 2026-04-04T12:55:00Z
1
value 0.7731
scoring_system epss
scoring_elements 0.98975
published_at 2026-04-07T12:55:00Z
2
value 0.7731
scoring_system epss
scoring_elements 0.98968
published_at 2026-04-01T12:55:00Z
3
value 0.7731
scoring_system epss
scoring_elements 0.9897
published_at 2026-04-02T12:55:00Z
4
value 0.78073
scoring_system epss
scoring_elements 0.99015
published_at 2026-04-13T12:55:00Z
5
value 0.78073
scoring_system epss
scoring_elements 0.99016
published_at 2026-04-16T12:55:00Z
6
value 0.78073
scoring_system epss
scoring_elements 0.99017
published_at 2026-04-21T12:55:00Z
7
value 0.78073
scoring_system epss
scoring_elements 0.9902
published_at 2026-04-24T12:55:00Z
8
value 0.78073
scoring_system epss
scoring_elements 0.99012
published_at 2026-04-09T12:55:00Z
9
value 0.78073
scoring_system epss
scoring_elements 0.99013
published_at 2026-04-11T12:55:00Z
10
value 0.78073
scoring_system epss
scoring_elements 0.99014
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-5000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=419931
reference_id 419931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=419931
4
reference_url https://httpd.apache.org/security/json/CVE-2007-5000.json
reference_id CVE-2007-5000
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-5000.json
5
reference_url https://access.redhat.com/errata/RHSA-2008:0004
reference_id RHSA-2008:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0004
6
reference_url https://access.redhat.com/errata/RHSA-2008:0005
reference_id RHSA-2008:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0005
7
reference_url https://access.redhat.com/errata/RHSA-2008:0006
reference_id RHSA-2008:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0006
8
reference_url https://access.redhat.com/errata/RHSA-2008:0007
reference_id RHSA-2008:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0007
9
reference_url https://access.redhat.com/errata/RHSA-2008:0008
reference_id RHSA-2008:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0008
10
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
11
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
12
reference_url https://usn.ubuntu.com/575-1/
reference_id USN-575-1
reference_type
scores
url https://usn.ubuntu.com/575-1/
fixed_packages
0
url pkg:apache/httpd@1.3.41
purl pkg:apache/httpd@1.3.41
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41
1
url pkg:apache/httpd@2.0.63
purl pkg:apache/httpd@2.0.63
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-fn5k-e2jr-6ube
9
vulnerability VCID-g2pp-aahn-mfcd
10
vulnerability VCID-kkfv-4jd1-bqdm
11
vulnerability VCID-pdj3-4txb-vych
12
vulnerability VCID-prd8-51a5-pygj
13
vulnerability VCID-qtav-hqnd-b7fa
14
vulnerability VCID-umuk-3n1q-3qet
15
vulnerability VCID-wycq-jwzz-q7hf
16
vulnerability VCID-y8nd-7h3r-7fh5
17
vulnerability VCID-ym93-sxb8-fkdm
18
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.63
2
url pkg:apache/httpd@2.2.8
purl pkg:apache/httpd@2.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-3cea-3rkm-r7gs
6
vulnerability VCID-3kyb-4yvt-f7e1
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5yez-d5nj-q7eq
11
vulnerability VCID-6bez-sgg8-cbbq
12
vulnerability VCID-6d43-sjqw-tbbp
13
vulnerability VCID-6pzx-1e5t-xbes
14
vulnerability VCID-7ftk-sajb-akh4
15
vulnerability VCID-7krj-8vat-3ydy
16
vulnerability VCID-7s2y-pvar-qqe3
17
vulnerability VCID-8axm-4anr-27ht
18
vulnerability VCID-8gcm-7q3n-q7bm
19
vulnerability VCID-d4rc-pnv5-6uc8
20
vulnerability VCID-ese4-47tg-efbw
21
vulnerability VCID-fn5k-e2jr-6ube
22
vulnerability VCID-fyrq-yg2u-jkc7
23
vulnerability VCID-fysz-5mr6-fbf1
24
vulnerability VCID-g2pp-aahn-mfcd
25
vulnerability VCID-gu44-7hkr-muae
26
vulnerability VCID-hcjv-md55-3fcr
27
vulnerability VCID-jt89-ruvk-1kbj
28
vulnerability VCID-k4kb-21tp-4kc8
29
vulnerability VCID-ke1s-451y-p3cz
30
vulnerability VCID-kkfv-4jd1-bqdm
31
vulnerability VCID-kpew-rarv-83dg
32
vulnerability VCID-pc2n-ga7g-byga
33
vulnerability VCID-pdj3-4txb-vych
34
vulnerability VCID-pdtf-5zv7-2qaf
35
vulnerability VCID-pj4f-awuq-73g6
36
vulnerability VCID-prd8-51a5-pygj
37
vulnerability VCID-qayj-kts9-3fde
38
vulnerability VCID-qtav-hqnd-b7fa
39
vulnerability VCID-rhk3-ujc1-q7fj
40
vulnerability VCID-ssvj-7g27-1ug6
41
vulnerability VCID-svyk-az69-qbfw
42
vulnerability VCID-t95h-xhtm-zbdv
43
vulnerability VCID-tbud-pwyt-aye9
44
vulnerability VCID-umuk-3n1q-3qet
45
vulnerability VCID-wycq-jwzz-q7hf
46
vulnerability VCID-y8nd-7h3r-7fh5
47
vulnerability VCID-ym93-sxb8-fkdm
48
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8
aliases CVE-2007-5000
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqkp-f1my-dbg9
1
url VCID-kgpj-aexq-7kah
vulnerability_id VCID-kgpj-aexq-7kah
summary A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6388.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6388.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6388
reference_id
reference_type
scores
0
value 0.85047
scoring_system epss
scoring_elements 0.99357
published_at 2026-04-24T12:55:00Z
1
value 0.85047
scoring_system epss
scoring_elements 0.99344
published_at 2026-04-01T12:55:00Z
2
value 0.85047
scoring_system epss
scoring_elements 0.99345
published_at 2026-04-02T12:55:00Z
3
value 0.85047
scoring_system epss
scoring_elements 0.99347
published_at 2026-04-04T12:55:00Z
4
value 0.85047
scoring_system epss
scoring_elements 0.99348
published_at 2026-04-07T12:55:00Z
5
value 0.85047
scoring_system epss
scoring_elements 0.9935
published_at 2026-04-09T12:55:00Z
6
value 0.85047
scoring_system epss
scoring_elements 0.99352
published_at 2026-04-11T12:55:00Z
7
value 0.85047
scoring_system epss
scoring_elements 0.99353
published_at 2026-04-13T12:55:00Z
8
value 0.85047
scoring_system epss
scoring_elements 0.99356
published_at 2026-04-18T12:55:00Z
9
value 0.85047
scoring_system epss
scoring_elements 0.99355
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6388
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=427228
reference_id 427228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=427228
4
reference_url https://httpd.apache.org/security/json/CVE-2007-6388.json
reference_id CVE-2007-6388
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-6388.json
5
reference_url https://access.redhat.com/errata/RHSA-2008:0004
reference_id RHSA-2008:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0004
6
reference_url https://access.redhat.com/errata/RHSA-2008:0005
reference_id RHSA-2008:0005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0005
7
reference_url https://access.redhat.com/errata/RHSA-2008:0006
reference_id RHSA-2008:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0006
8
reference_url https://access.redhat.com/errata/RHSA-2008:0007
reference_id RHSA-2008:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0007
9
reference_url https://access.redhat.com/errata/RHSA-2008:0008
reference_id RHSA-2008:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0008
10
reference_url https://access.redhat.com/errata/RHSA-2008:0263
reference_id RHSA-2008:0263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0263
11
reference_url https://access.redhat.com/errata/RHSA-2008:0523
reference_id RHSA-2008:0523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0523
12
reference_url https://usn.ubuntu.com/575-1/
reference_id USN-575-1
reference_type
scores
url https://usn.ubuntu.com/575-1/
fixed_packages
0
url pkg:apache/httpd@1.3.41
purl pkg:apache/httpd@1.3.41
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-123w-f3zc-37d9
1
vulnerability VCID-prd8-51a5-pygj
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41
1
url pkg:apache/httpd@2.0.63
purl pkg:apache/httpd@2.0.63
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1bv2-mkj8-ubaz
1
vulnerability VCID-3cea-3rkm-r7gs
2
vulnerability VCID-4zzy-q5zp-jkgm
3
vulnerability VCID-56kt-8bg6-zbcj
4
vulnerability VCID-5yez-d5nj-q7eq
5
vulnerability VCID-6d43-sjqw-tbbp
6
vulnerability VCID-7krj-8vat-3ydy
7
vulnerability VCID-d4rc-pnv5-6uc8
8
vulnerability VCID-fn5k-e2jr-6ube
9
vulnerability VCID-g2pp-aahn-mfcd
10
vulnerability VCID-kkfv-4jd1-bqdm
11
vulnerability VCID-pdj3-4txb-vych
12
vulnerability VCID-prd8-51a5-pygj
13
vulnerability VCID-qtav-hqnd-b7fa
14
vulnerability VCID-umuk-3n1q-3qet
15
vulnerability VCID-wycq-jwzz-q7hf
16
vulnerability VCID-y8nd-7h3r-7fh5
17
vulnerability VCID-ym93-sxb8-fkdm
18
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.63
2
url pkg:apache/httpd@2.2.8
purl pkg:apache/httpd@2.2.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-1bv2-mkj8-ubaz
2
vulnerability VCID-1d24-sy5z-jfhh
3
vulnerability VCID-1zk6-7wv2-ukcz
4
vulnerability VCID-2xc4-7zg9-y7fw
5
vulnerability VCID-3cea-3rkm-r7gs
6
vulnerability VCID-3kyb-4yvt-f7e1
7
vulnerability VCID-4zzy-q5zp-jkgm
8
vulnerability VCID-56kt-8bg6-zbcj
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5yez-d5nj-q7eq
11
vulnerability VCID-6bez-sgg8-cbbq
12
vulnerability VCID-6d43-sjqw-tbbp
13
vulnerability VCID-6pzx-1e5t-xbes
14
vulnerability VCID-7ftk-sajb-akh4
15
vulnerability VCID-7krj-8vat-3ydy
16
vulnerability VCID-7s2y-pvar-qqe3
17
vulnerability VCID-8axm-4anr-27ht
18
vulnerability VCID-8gcm-7q3n-q7bm
19
vulnerability VCID-d4rc-pnv5-6uc8
20
vulnerability VCID-ese4-47tg-efbw
21
vulnerability VCID-fn5k-e2jr-6ube
22
vulnerability VCID-fyrq-yg2u-jkc7
23
vulnerability VCID-fysz-5mr6-fbf1
24
vulnerability VCID-g2pp-aahn-mfcd
25
vulnerability VCID-gu44-7hkr-muae
26
vulnerability VCID-hcjv-md55-3fcr
27
vulnerability VCID-jt89-ruvk-1kbj
28
vulnerability VCID-k4kb-21tp-4kc8
29
vulnerability VCID-ke1s-451y-p3cz
30
vulnerability VCID-kkfv-4jd1-bqdm
31
vulnerability VCID-kpew-rarv-83dg
32
vulnerability VCID-pc2n-ga7g-byga
33
vulnerability VCID-pdj3-4txb-vych
34
vulnerability VCID-pdtf-5zv7-2qaf
35
vulnerability VCID-pj4f-awuq-73g6
36
vulnerability VCID-prd8-51a5-pygj
37
vulnerability VCID-qayj-kts9-3fde
38
vulnerability VCID-qtav-hqnd-b7fa
39
vulnerability VCID-rhk3-ujc1-q7fj
40
vulnerability VCID-ssvj-7g27-1ug6
41
vulnerability VCID-svyk-az69-qbfw
42
vulnerability VCID-t95h-xhtm-zbdv
43
vulnerability VCID-tbud-pwyt-aye9
44
vulnerability VCID-umuk-3n1q-3qet
45
vulnerability VCID-wycq-jwzz-q7hf
46
vulnerability VCID-y8nd-7h3r-7fh5
47
vulnerability VCID-ym93-sxb8-fkdm
48
vulnerability VCID-zkbr-1m2z-ufe7
resource_url http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8
aliases CVE-2007-6388
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kgpj-aexq-7kah
Risk_score9.6
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41