Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/apache2@2.2.16-6%2Bsqueeze15
Typedeb
Namespacedebian
Nameapache2
Version2.2.16-6+squeeze15
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.4.66-1~deb12u1
Latest_non_vulnerable_version2.4.66-1~deb12u1
Affected_by_vulnerabilities
0
url VCID-1189-ej89-hybs
vulnerability_id VCID-1189-ej89-hybs
summary mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3169.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3169
reference_id
reference_type
scores
0
value 0.34517
scoring_system epss
scoring_elements 0.96968
published_at 2026-04-01T12:55:00Z
1
value 0.34517
scoring_system epss
scoring_elements 0.96996
published_at 2026-04-13T12:55:00Z
2
value 0.34517
scoring_system epss
scoring_elements 0.96991
published_at 2026-04-08T12:55:00Z
3
value 0.34517
scoring_system epss
scoring_elements 0.96992
published_at 2026-04-09T12:55:00Z
4
value 0.34517
scoring_system epss
scoring_elements 0.96994
published_at 2026-04-11T12:55:00Z
5
value 0.34517
scoring_system epss
scoring_elements 0.96995
published_at 2026-04-12T12:55:00Z
6
value 0.34517
scoring_system epss
scoring_elements 0.96976
published_at 2026-04-02T12:55:00Z
7
value 0.34517
scoring_system epss
scoring_elements 0.9698
published_at 2026-04-04T12:55:00Z
8
value 0.34517
scoring_system epss
scoring_elements 0.96982
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3169
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1463197
reference_id 1463197
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1463197
8
reference_url https://security.archlinux.org/ASA-201706-34
reference_id ASA-201706-34
reference_type
scores
url https://security.archlinux.org/ASA-201706-34
9
reference_url https://security.archlinux.org/AVG-316
reference_id AVG-316
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-316
10
reference_url https://httpd.apache.org/security/json/CVE-2017-3169.json
reference_id CVE-2017-3169
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-3169.json
11
reference_url https://security.gentoo.org/glsa/201710-32
reference_id GLSA-201710-32
reference_type
scores
url https://security.gentoo.org/glsa/201710-32
12
reference_url https://access.redhat.com/errata/RHSA-2017:2478
reference_id RHSA-2017:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2478
13
reference_url https://access.redhat.com/errata/RHSA-2017:2479
reference_id RHSA-2017:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2479
14
reference_url https://access.redhat.com/errata/RHSA-2017:2483
reference_id RHSA-2017:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2483
15
reference_url https://access.redhat.com/errata/RHSA-2017:3193
reference_id RHSA-2017:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3193
16
reference_url https://access.redhat.com/errata/RHSA-2017:3194
reference_id RHSA-2017:3194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3194
17
reference_url https://access.redhat.com/errata/RHSA-2017:3195
reference_id RHSA-2017:3195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3195
18
reference_url https://access.redhat.com/errata/RHSA-2017:3475
reference_id RHSA-2017:3475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3475
19
reference_url https://access.redhat.com/errata/RHSA-2017:3476
reference_id RHSA-2017:3476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3476
20
reference_url https://access.redhat.com/errata/RHSA-2017:3477
reference_id RHSA-2017:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3477
21
reference_url https://usn.ubuntu.com/3340-1/
reference_id USN-3340-1
reference_type
scores
url https://usn.ubuntu.com/3340-1/
22
reference_url https://usn.ubuntu.com/3373-1/
reference_id USN-3373-1
reference_type
scores
url https://usn.ubuntu.com/3373-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-3169
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1189-ej89-hybs
1
url VCID-17hy-4ppt-xyhw
vulnerability_id VCID-17hy-4ppt-xyhw
summary Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted SessionHeader sent by an origin server could cause a heap overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26691.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-26691
reference_id
reference_type
scores
0
value 0.40357
scoring_system epss
scoring_elements 0.97325
published_at 2026-04-01T12:55:00Z
1
value 0.40357
scoring_system epss
scoring_elements 0.97348
published_at 2026-04-13T12:55:00Z
2
value 0.40357
scoring_system epss
scoring_elements 0.97344
published_at 2026-04-09T12:55:00Z
3
value 0.40357
scoring_system epss
scoring_elements 0.97346
published_at 2026-04-11T12:55:00Z
4
value 0.40357
scoring_system epss
scoring_elements 0.97347
published_at 2026-04-12T12:55:00Z
5
value 0.40357
scoring_system epss
scoring_elements 0.97332
published_at 2026-04-02T12:55:00Z
6
value 0.40357
scoring_system epss
scoring_elements 0.97336
published_at 2026-04-07T12:55:00Z
7
value 0.40357
scoring_system epss
scoring_elements 0.97343
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-26691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1966732
reference_id 1966732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1966732
9
reference_url https://security.archlinux.org/AVG-2053
reference_id AVG-2053
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2053
10
reference_url https://httpd.apache.org/security/json/CVE-2021-26691.json
reference_id CVE-2021-26691
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-26691.json
11
reference_url https://security.gentoo.org/glsa/202107-38
reference_id GLSA-202107-38
reference_type
scores
url https://security.gentoo.org/glsa/202107-38
12
reference_url https://access.redhat.com/errata/RHSA-2021:3816
reference_id RHSA-2021:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3816
13
reference_url https://access.redhat.com/errata/RHSA-2021:4613
reference_id RHSA-2021:4613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4613
14
reference_url https://access.redhat.com/errata/RHSA-2021:4614
reference_id RHSA-2021:4614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4614
15
reference_url https://access.redhat.com/errata/RHSA-2022:0143
reference_id RHSA-2022:0143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0143
16
reference_url https://usn.ubuntu.com/4994-1/
reference_id USN-4994-1
reference_type
scores
url https://usn.ubuntu.com/4994-1/
17
reference_url https://usn.ubuntu.com/4994-2/
reference_id USN-4994-2
reference_type
scores
url https://usn.ubuntu.com/4994-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-26691
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-17hy-4ppt-xyhw
2
url VCID-1bv2-mkj8-ubaz
vulnerability_id VCID-1bv2-mkj8-ubaz
summary mod_rewrite does not filter terminal escape sequences from logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
3
reference_url http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch
reference_id
reference_type
scores
url http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-0815.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0815.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1207.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1207.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1208.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1208.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2013-1209.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1209.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1862.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1862.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1862
reference_id
reference_type
scores
0
value 0.39611
scoring_system epss
scoring_elements 0.97309
published_at 2026-04-13T12:55:00Z
1
value 0.39611
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-01T12:55:00Z
2
value 0.39611
scoring_system epss
scoring_elements 0.97307
published_at 2026-04-11T12:55:00Z
3
value 0.39611
scoring_system epss
scoring_elements 0.97308
published_at 2026-04-12T12:55:00Z
4
value 0.39611
scoring_system epss
scoring_elements 0.97292
published_at 2026-04-02T12:55:00Z
5
value 0.39611
scoring_system epss
scoring_elements 0.97297
published_at 2026-04-04T12:55:00Z
6
value 0.39611
scoring_system epss
scoring_elements 0.97298
published_at 2026-04-07T12:55:00Z
7
value 0.39611
scoring_system epss
scoring_elements 0.97304
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1862
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862
11
reference_url http://secunia.com/advisories/55032
reference_id
reference_type
scores
url http://secunia.com/advisories/55032
12
reference_url https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
reference_id
reference_type
scores
url https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
13
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18790
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18790
34
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19534
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19534
35
reference_url http://support.apple.com/kb/HT6150
reference_id
reference_type
scores
url http://support.apple.com/kb/HT6150
36
reference_url http://svn.apache.org/viewvc?view=revision&revision=r1469311
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=revision&revision=r1469311
37
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1862
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1862
38
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
39
reference_url http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
reference_id
reference_type
scores
url http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:174
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:174
41
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
42
reference_url http://www.securityfocus.com/bid/59826
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59826
43
reference_url http://www.securityfocus.com/bid/64758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/64758
44
reference_url http://www.ubuntu.com/usn/USN-1903-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1903-1
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=953729
reference_id 953729
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=953729
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
72
reference_url https://httpd.apache.org/security/json/CVE-2013-1862.json
reference_id CVE-2013-1862
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2013-1862.json
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1862
reference_id CVE-2013-1862
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1862
74
reference_url https://security.gentoo.org/glsa/201309-12
reference_id GLSA-201309-12
reference_type
scores
url https://security.gentoo.org/glsa/201309-12
75
reference_url https://access.redhat.com/errata/RHSA-2013:0815
reference_id RHSA-2013:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0815
76
reference_url https://access.redhat.com/errata/RHSA-2013:1133
reference_id RHSA-2013:1133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1133
77
reference_url https://access.redhat.com/errata/RHSA-2013:1134
reference_id RHSA-2013:1134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1134
78
reference_url https://access.redhat.com/errata/RHSA-2013:1207
reference_id RHSA-2013:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1207
79
reference_url https://access.redhat.com/errata/RHSA-2013:1208
reference_id RHSA-2013:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1208
80
reference_url https://access.redhat.com/errata/RHSA-2013:1209
reference_id RHSA-2013:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1209
81
reference_url https://usn.ubuntu.com/1903-1/
reference_id USN-1903-1
reference_type
scores
url https://usn.ubuntu.com/1903-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2013-1862
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bv2-mkj8-ubaz
3
url VCID-1d24-sy5z-jfhh
vulnerability_id VCID-1d24-sy5z-jfhh
summary HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. This fix adds the "MergeTrailers" directive to restore legacy behavior.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5704.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5704.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5704
reference_id
reference_type
scores
0
value 0.64689
scoring_system epss
scoring_elements 0.9846
published_at 2026-04-13T12:55:00Z
1
value 0.64689
scoring_system epss
scoring_elements 0.98446
published_at 2026-04-01T12:55:00Z
2
value 0.64689
scoring_system epss
scoring_elements 0.98448
published_at 2026-04-02T12:55:00Z
3
value 0.64689
scoring_system epss
scoring_elements 0.98451
published_at 2026-04-04T12:55:00Z
4
value 0.64689
scoring_system epss
scoring_elements 0.98453
published_at 2026-04-07T12:55:00Z
5
value 0.64689
scoring_system epss
scoring_elements 0.98457
published_at 2026-04-08T12:55:00Z
6
value 0.64689
scoring_system epss
scoring_elements 0.98458
published_at 2026-04-09T12:55:00Z
7
value 0.64689
scoring_system epss
scoring_elements 0.98461
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5704
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1082903
reference_id 1082903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1082903
4
reference_url https://httpd.apache.org/security/json/CVE-2013-5704.json
reference_id CVE-2013-5704
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2013-5704.json
5
reference_url https://security.gentoo.org/glsa/201504-03
reference_id GLSA-201504-03
reference_type
scores
url https://security.gentoo.org/glsa/201504-03
6
reference_url https://access.redhat.com/errata/RHSA-2014:1972
reference_id RHSA-2014:1972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1972
7
reference_url https://access.redhat.com/errata/RHSA-2015:0325
reference_id RHSA-2015:0325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0325
8
reference_url https://access.redhat.com/errata/RHSA-2015:1249
reference_id RHSA-2015:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1249
9
reference_url https://access.redhat.com/errata/RHSA-2015:2661
reference_id RHSA-2015:2661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2661
10
reference_url https://access.redhat.com/errata/RHSA-2016:0061
reference_id RHSA-2016:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0061
11
reference_url https://access.redhat.com/errata/RHSA-2016:0062
reference_id RHSA-2016:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0062
12
reference_url https://usn.ubuntu.com/2523-1/
reference_id USN-2523-1
reference_type
scores
url https://usn.ubuntu.com/2523-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2013-5704
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1d24-sy5z-jfhh
4
url VCID-1wh1-9ccd-s7hq
vulnerability_id VCID-1wh1-9ccd-s7hq
summary The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0216
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.1607
published_at 2026-04-01T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16253
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16315
published_at 2026-04-04T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16113
published_at 2026-04-07T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16198
published_at 2026-04-08T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16263
published_at 2026-04-09T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16246
published_at 2026-04-11T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16206
published_at 2026-04-12T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16138
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0216
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0216
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-0216
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1wh1-9ccd-s7hq
5
url VCID-1zk6-7wv2-ukcz
vulnerability_id VCID-1zk6-7wv2-ukcz
summary A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0304.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0304.html
1
reference_url http://advisories.mageia.org/MGASA-2014-0305.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0305.html
2
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
3
reference_url http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
4
reference_url http://marc.info/?l=bugtraq&m=143403519711434&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143403519711434&w=2
5
reference_url http://marc.info/?l=bugtraq&m=143748090628601&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143748090628601&w=2
6
reference_url http://marc.info/?l=bugtraq&m=144050155601375&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144050155601375&w=2
7
reference_url http://marc.info/?l=bugtraq&m=144493176821532&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144493176821532&w=2
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1019.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1019.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1020.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1020.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1021.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1021.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0118.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0118.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0118
reference_id
reference_type
scores
0
value 0.41327
scoring_system epss
scoring_elements 0.97395
published_at 2026-04-13T12:55:00Z
1
value 0.41327
scoring_system epss
scoring_elements 0.97372
published_at 2026-04-01T12:55:00Z
2
value 0.41327
scoring_system epss
scoring_elements 0.97392
published_at 2026-04-09T12:55:00Z
3
value 0.41327
scoring_system epss
scoring_elements 0.97394
published_at 2026-04-12T12:55:00Z
4
value 0.41327
scoring_system epss
scoring_elements 0.97378
published_at 2026-04-02T12:55:00Z
5
value 0.41327
scoring_system epss
scoring_elements 0.97383
published_at 2026-04-04T12:55:00Z
6
value 0.41327
scoring_system epss
scoring_elements 0.97384
published_at 2026-04-07T12:55:00Z
7
value 0.41327
scoring_system epss
scoring_elements 0.9739
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0118
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
16
reference_url https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
reference_id
reference_type
scores
url https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
17
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
37
reference_url https://puppet.com/security/cve/cve-2014-0118
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2014-0118
38
reference_url https://support.apple.com/HT204659
reference_id
reference_type
scores
url https://support.apple.com/HT204659
39
reference_url http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
reference_id
reference_type
scores
url http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
40
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c
41
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c?r1=1604353&r2=1610501&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c?r1=1604353&r2=1610501&diff_format=h
42
reference_url http://www.debian.org/security/2014/dsa-2989
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2989
43
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:142
44
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
45
reference_url http://www.securityfocus.com/bid/68745
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68745
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1120601
reference_id 1120601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1120601
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
54
reference_url https://httpd.apache.org/security/json/CVE-2014-0118.json
reference_id CVE-2014-0118
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2014-0118.json
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0118
reference_id CVE-2014-0118
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-0118
56
reference_url https://security.gentoo.org/glsa/201504-03
reference_id GLSA-201504-03
reference_type
scores
url https://security.gentoo.org/glsa/201504-03
57
reference_url https://access.redhat.com/errata/RHSA-2014:0920
reference_id RHSA-2014:0920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0920
58
reference_url https://access.redhat.com/errata/RHSA-2014:0921
reference_id RHSA-2014:0921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0921
59
reference_url https://access.redhat.com/errata/RHSA-2014:0922
reference_id RHSA-2014:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0922
60
reference_url https://access.redhat.com/errata/RHSA-2014:1019
reference_id RHSA-2014:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1019
61
reference_url https://access.redhat.com/errata/RHSA-2014:1020
reference_id RHSA-2014:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1020
62
reference_url https://access.redhat.com/errata/RHSA-2014:1021
reference_id RHSA-2014:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1021
63
reference_url https://access.redhat.com/errata/RHSA-2014:1086
reference_id RHSA-2014:1086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1086
64
reference_url https://access.redhat.com/errata/RHSA-2014:1087
reference_id RHSA-2014:1087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1087
65
reference_url https://access.redhat.com/errata/RHSA-2014:1088
reference_id RHSA-2014:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1088
66
reference_url https://usn.ubuntu.com/2299-1/
reference_id USN-2299-1
reference_type
scores
url https://usn.ubuntu.com/2299-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
1
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2014-0118
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1zk6-7wv2-ukcz
6
url VCID-2d8p-bbc1-hkfa
vulnerability_id VCID-2d8p-bbc1-hkfa
summary
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58098.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58098
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07443
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07398
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08736
published_at 2026-04-13T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08771
published_at 2026-04-09T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08772
published_at 2026-04-11T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.0875
published_at 2026-04-12T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08669
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08745
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419365
reference_id 2419365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419365
6
reference_url https://httpd.apache.org/security/json/CVE-2025-58098.json
reference_id CVE-2025-58098
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-58098.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:0009
reference_id RHSA-2026:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0009
11
reference_url https://access.redhat.com/errata/RHSA-2026:0010
reference_id RHSA-2026:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0010
12
reference_url https://access.redhat.com/errata/RHSA-2026:0011
reference_id RHSA-2026:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0011
13
reference_url https://access.redhat.com/errata/RHSA-2026:0012
reference_id RHSA-2026:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0012
14
reference_url https://access.redhat.com/errata/RHSA-2026:0074
reference_id RHSA-2026:0074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0074
15
reference_url https://access.redhat.com/errata/RHSA-2026:0075
reference_id RHSA-2026:0075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0075
16
reference_url https://access.redhat.com/errata/RHSA-2026:0090
reference_id RHSA-2026:0090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0090
17
reference_url https://access.redhat.com/errata/RHSA-2026:0095
reference_id RHSA-2026:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0095
18
reference_url https://access.redhat.com/errata/RHSA-2026:0139
reference_id RHSA-2026:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0139
19
reference_url https://access.redhat.com/errata/RHSA-2026:0141
reference_id RHSA-2026:0141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0141
20
reference_url https://access.redhat.com/errata/RHSA-2026:0171
reference_id RHSA-2026:0171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0171
21
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
22
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
23
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-58098
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2d8p-bbc1-hkfa
7
url VCID-2e6w-fs4j-17g9
vulnerability_id VCID-2e6w-fs4j-17g9
summary HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27316.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27316.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27316
reference_id
reference_type
scores
0
value 0.89409
scoring_system epss
scoring_elements 0.99546
published_at 2026-04-13T12:55:00Z
1
value 0.89409
scoring_system epss
scoring_elements 0.99542
published_at 2026-04-02T12:55:00Z
2
value 0.89409
scoring_system epss
scoring_elements 0.99543
published_at 2026-04-04T12:55:00Z
3
value 0.89409
scoring_system epss
scoring_elements 0.99545
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27316
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068412
reference_id 1068412
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068412
10
reference_url https://www.openwall.com/lists/oss-security/2024/04/03/16
reference_id 16
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:46:29Z/
url https://www.openwall.com/lists/oss-security/2024/04/03/16
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:46:29Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2268277
reference_id 2268277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2268277
13
reference_url http://www.openwall.com/lists/oss-security/2024/04/04/4
reference_id 4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:46:29Z/
url http://www.openwall.com/lists/oss-security/2024/04/04/4
14
reference_url https://httpd.apache.org/security/json/CVE-2024-27316.json
reference_id CVE-2024-27316
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-27316.json
15
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
16
reference_url https://support.apple.com/kb/HT214119
reference_id HT214119
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-29T15:46:29Z/
url https://support.apple.com/kb/HT214119
17
reference_url https://access.redhat.com/errata/RHSA-2024:1786
reference_id RHSA-2024:1786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1786
18
reference_url https://access.redhat.com/errata/RHSA-2024:1872
reference_id RHSA-2024:1872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1872
19
reference_url https://access.redhat.com/errata/RHSA-2024:2564
reference_id RHSA-2024:2564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2564
20
reference_url https://access.redhat.com/errata/RHSA-2024:2693
reference_id RHSA-2024:2693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2693
21
reference_url https://access.redhat.com/errata/RHSA-2024:2694
reference_id RHSA-2024:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2694
22
reference_url https://access.redhat.com/errata/RHSA-2024:2891
reference_id RHSA-2024:2891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2891
23
reference_url https://access.redhat.com/errata/RHSA-2024:2907
reference_id RHSA-2024:2907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2907
24
reference_url https://access.redhat.com/errata/RHSA-2024:3402
reference_id RHSA-2024:3402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3402
25
reference_url https://access.redhat.com/errata/RHSA-2024:3417
reference_id RHSA-2024:3417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3417
26
reference_url https://access.redhat.com/errata/RHSA-2024:4390
reference_id RHSA-2024:4390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4390
27
reference_url https://access.redhat.com/errata/RHSA-2025:16668
reference_id RHSA-2025:16668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16668
28
reference_url https://usn.ubuntu.com/6729-1/
reference_id USN-6729-1
reference_type
scores
url https://usn.ubuntu.com/6729-1/
29
reference_url https://usn.ubuntu.com/6729-2/
reference_id USN-6729-2
reference_type
scores
url https://usn.ubuntu.com/6729-2/
30
reference_url https://usn.ubuntu.com/6729-3/
reference_id USN-6729-3
reference_type
scores
url https://usn.ubuntu.com/6729-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-27316
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2e6w-fs4j-17g9
8
url VCID-2nmh-7tfa-zyb2
vulnerability_id VCID-2nmh-7tfa-zyb2
summary Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. An authentication tag (SipHash MAC) is now added to prevent such attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0736.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0736
reference_id
reference_type
scores
0
value 0.4168
scoring_system epss
scoring_elements 0.97392
published_at 2026-04-01T12:55:00Z
1
value 0.4168
scoring_system epss
scoring_elements 0.97418
published_at 2026-04-13T12:55:00Z
2
value 0.4168
scoring_system epss
scoring_elements 0.97416
published_at 2026-04-11T12:55:00Z
3
value 0.4168
scoring_system epss
scoring_elements 0.97417
published_at 2026-04-12T12:55:00Z
4
value 0.4168
scoring_system epss
scoring_elements 0.97399
published_at 2026-04-02T12:55:00Z
5
value 0.4168
scoring_system epss
scoring_elements 0.97403
published_at 2026-04-04T12:55:00Z
6
value 0.4168
scoring_system epss
scoring_elements 0.97406
published_at 2026-04-07T12:55:00Z
7
value 0.4168
scoring_system epss
scoring_elements 0.97413
published_at 2026-04-08T12:55:00Z
8
value 0.4168
scoring_system epss
scoring_elements 0.97414
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406744
reference_id 1406744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406744
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/40961.py
reference_id CVE-2016-0736
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/40961.py
8
reference_url https://httpd.apache.org/security/json/CVE-2016-0736.json
reference_id CVE-2016-0736
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2016-0736.json
9
reference_url https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt
reference_id CVE-2016-0736
reference_type exploit
scores
url https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt
10
reference_url https://security.gentoo.org/glsa/201701-36
reference_id GLSA-201701-36
reference_type
scores
url https://security.gentoo.org/glsa/201701-36
11
reference_url https://access.redhat.com/errata/RHSA-2017:0906
reference_id RHSA-2017:0906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0906
12
reference_url https://access.redhat.com/errata/RHSA-2017:1161
reference_id RHSA-2017:1161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1161
13
reference_url https://access.redhat.com/errata/RHSA-2017:1413
reference_id RHSA-2017:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1413
14
reference_url https://access.redhat.com/errata/RHSA-2017:1414
reference_id RHSA-2017:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1414
15
reference_url https://access.redhat.com/errata/RHSA-2017:1415
reference_id RHSA-2017:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1415
16
reference_url https://usn.ubuntu.com/3279-1/
reference_id USN-3279-1
reference_type
scores
url https://usn.ubuntu.com/3279-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2016-0736
risk_score 9.8
exploitability 2.0
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmh-7tfa-zyb2
9
url VCID-2xc4-7zg9-y7fw
vulnerability_id VCID-2xc4-7zg9-y7fw
summary HTTP_PROXY is a well-defined environment variable in a CGI process, which collided with a number of libraries which failed to avoid colliding with this CGI namespace. A mitigation is provided for the httpd CGI environment to avoid populating the "HTTP_PROXY" variable from a "Proxy:" header, which has never been registered by IANA. This workaround and patch are documented in the ASF Advisory at asf-httpoxy-response.txt and incorporated in the 2.4.25 and 2.2.32 releases. Note: This is not assigned an httpd severity, as it is a defect in other software which overloaded well-established CGI environment variables, and does not reflect an error in HTTP server software.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1624.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1624.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1625.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1625.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1648.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1648.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1649.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1649.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1650.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1650.html
6
reference_url https://access.redhat.com/errata/RHSA-2016:1635
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1635
7
reference_url https://access.redhat.com/errata/RHSA-2016:1636
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1636
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5387.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5387.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5387
reference_id
reference_type
scores
0
value 0.41959
scoring_system epss
scoring_elements 0.9741
published_at 2026-04-02T12:55:00Z
1
value 0.41959
scoring_system epss
scoring_elements 0.97403
published_at 2026-04-01T12:55:00Z
2
value 0.60283
scoring_system epss
scoring_elements 0.98278
published_at 2026-04-13T12:55:00Z
3
value 0.60283
scoring_system epss
scoring_elements 0.98268
published_at 2026-04-04T12:55:00Z
4
value 0.60283
scoring_system epss
scoring_elements 0.98269
published_at 2026-04-07T12:55:00Z
5
value 0.60283
scoring_system epss
scoring_elements 0.98274
published_at 2026-04-09T12:55:00Z
6
value 0.60283
scoring_system epss
scoring_elements 0.98277
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5387
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
13
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
14
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
15
reference_url https://httpoxy.org/
reference_id
reference_type
scores
url https://httpoxy.org/
16
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/
41
reference_url https://support.apple.com/HT208221
reference_id
reference_type
scores
url https://support.apple.com/HT208221
42
reference_url https://www.apache.org/security/asf-httpoxy-response.txt
reference_id
reference_type
scores
url https://www.apache.org/security/asf-httpoxy-response.txt
43
reference_url https://www.tenable.com/security/tns-2017-04
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2017-04
44
reference_url http://www.debian.org/security/2016/dsa-3623
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3623
45
reference_url http://www.kb.cert.org/vuls/id/797896
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/797896
46
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
47
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
48
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
49
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
50
reference_url http://www.securityfocus.com/bid/91816
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91816
51
reference_url http://www.securitytracker.com/id/1036330
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036330
52
reference_url http://www.ubuntu.com/usn/USN-3038-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3038-1
53
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1353755
reference_id 1353755
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1353755
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_web_server:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_web_server:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_web_server:2.1.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
99
reference_url https://httpd.apache.org/security/json/CVE-2016-5387.json
reference_id CVE-2016-5387
reference_type
scores
0
value n/a
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2016-5387.json
100
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5387
reference_id CVE-2016-5387
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5387
101
reference_url https://security.gentoo.org/glsa/201701-36
reference_id GLSA-201701-36
reference_type
scores
url https://security.gentoo.org/glsa/201701-36
102
reference_url https://access.redhat.com/errata/RHSA-2016:1420
reference_id RHSA-2016:1420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1420
103
reference_url https://access.redhat.com/errata/RHSA-2016:1421
reference_id RHSA-2016:1421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1421
104
reference_url https://access.redhat.com/errata/RHSA-2016:1422
reference_id RHSA-2016:1422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1422
105
reference_url https://access.redhat.com/errata/RHSA-2016:1625
reference_id RHSA-2016:1625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1625
106
reference_url https://access.redhat.com/errata/RHSA-2016:1648
reference_id RHSA-2016:1648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1648
107
reference_url https://access.redhat.com/errata/RHSA-2016:1649
reference_id RHSA-2016:1649
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1649
108
reference_url https://access.redhat.com/errata/RHSA-2016:1650
reference_id RHSA-2016:1650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1650
109
reference_url https://access.redhat.com/errata/RHSA-2016:1851
reference_id RHSA-2016:1851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1851
110
reference_url https://usn.ubuntu.com/3038-1/
reference_id USN-3038-1
reference_type
scores
url https://usn.ubuntu.com/3038-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2016-5387
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xc4-7zg9-y7fw
10
url VCID-3ay7-bwah-2yd1
vulnerability_id VCID-3ay7-bwah-2yd1
summary
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.

This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.

Users are recommended to upgrade to version 2.4.64, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42516.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42516.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-42516
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.5352
published_at 2026-04-02T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53546
published_at 2026-04-04T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.56554
published_at 2026-04-13T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.56587
published_at 2026-04-09T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56597
published_at 2026-04-11T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56573
published_at 2026-04-12T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56532
published_at 2026-04-07T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56583
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-42516
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42516
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374549
reference_id 2374549
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374549
5
reference_url https://httpd.apache.org/security/json/CVE-2024-42516.json
reference_id CVE-2024-42516
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-42516.json
6
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
7
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2024-42516
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ay7-bwah-2yd1
11
url VCID-3djp-gq4c-1fa9
vulnerability_id VCID-3djp-gq4c-1fa9
summary A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malfomed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. We have taken this opportunity to also remove request data from many other in-built error messages. Note however this issue did not affect them directly and their output was already escaped to prevent cross-site scripting attacks.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10092.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10092.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10092
reference_id
reference_type
scores
0
value 0.82379
scoring_system epss
scoring_elements 0.99216
published_at 2026-04-01T12:55:00Z
1
value 0.82379
scoring_system epss
scoring_elements 0.99221
published_at 2026-04-04T12:55:00Z
2
value 0.82379
scoring_system epss
scoring_elements 0.99225
published_at 2026-04-13T12:55:00Z
3
value 0.82379
scoring_system epss
scoring_elements 0.99224
published_at 2026-04-07T12:55:00Z
4
value 0.82379
scoring_system epss
scoring_elements 0.99218
published_at 2026-04-02T12:55:00Z
5
value 0.82379
scoring_system epss
scoring_elements 0.99226
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10092
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd
reference_id
reference_type
scores
url https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd
10
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
11
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94%40%3Cannounce.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94%40%3Cannounce.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4%40%3Cusers.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4%40%3Cusers.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html
25
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/
27
reference_url https://seclists.org/bugtraq/2019/Aug/47
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Aug/47
28
reference_url https://seclists.org/bugtraq/2019/Oct/24
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Oct/24
29
reference_url https://security.netapp.com/advisory/ntap-20190905-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190905-0003/
30
reference_url https://support.f5.com/csp/article/K30442259
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K30442259
31
reference_url https://www.debian.org/security/2019/dsa-4509
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4509
32
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
33
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
34
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
35
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
36
reference_url http://www.openwall.com/lists/oss-security/2019/08/15/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/08/15/4
37
reference_url http://www.openwall.com/lists/oss-security/2020/08/08/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/08/08/1
38
reference_url http://www.openwall.com/lists/oss-security/2020/08/08/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/08/08/9
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743956
reference_id 1743956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743956
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collection:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:software_collection:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collection:1.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:9.6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:-:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p1:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:9.6:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p1:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p3:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:9.6:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p3:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p4:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:9.6:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p4:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p7:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:9.6:p7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p7:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p8:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:9.6:p8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:9.6:p8:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
66
reference_url https://0day.work/proof-of-concept-for-apache-httpd-limited-cross-site-scripting-in-mod_proxy-error-page-cve-2019-10092/
reference_id CVE-2019-10092
reference_type exploit
scores
url https://0day.work/proof-of-concept-for-apache-httpd-limited-cross-site-scripting-in-mod_proxy-error-page-cve-2019-10092/
67
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/47688.md
reference_id CVE-2019-10092
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/47688.md
68
reference_url https://httpd.apache.org/security/json/CVE-2019-10092.json
reference_id CVE-2019-10092
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-10092.json
69
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10092
reference_id CVE-2019-10092
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-10092
70
reference_url https://security.gentoo.org/glsa/201909-04
reference_id GLSA-201909-04
reference_type
scores
url https://security.gentoo.org/glsa/201909-04
71
reference_url https://access.redhat.com/errata/RHSA-2019:4126
reference_id RHSA-2019:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4126
72
reference_url https://access.redhat.com/errata/RHSA-2020:1336
reference_id RHSA-2020:1336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1336
73
reference_url https://access.redhat.com/errata/RHSA-2020:1337
reference_id RHSA-2020:1337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1337
74
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
75
reference_url https://usn.ubuntu.com/4113-1/
reference_id USN-4113-1
reference_type
scores
url https://usn.ubuntu.com/4113-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
2
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2019-10092
risk_score 10.0
exploitability 2.0
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3djp-gq4c-1fa9
12
url VCID-3wuk-hwg1-6fa6
vulnerability_id VCID-3wuk-hwg1-6fa6
summary A design error in the "ap_some_auth_required" function renders the API unusuable in httpd 2.4.x. In particular the API is documented to answering if the request required authentication but only answers if there are Require lines in the applicable configuration. Since 2.4.x Require lines are used for authorization as well and can appear in configurations even when no authentication is required and the request is entirely unrestricted. This could lead to modules using this API to allow access when they should otherwise not do so. API users should use the new ap_some_authn_required API added in 2.4.16 instead.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3185.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3185
reference_id
reference_type
scores
0
value 0.09491
scoring_system epss
scoring_elements 0.92802
published_at 2026-04-01T12:55:00Z
1
value 0.09491
scoring_system epss
scoring_elements 0.92809
published_at 2026-04-02T12:55:00Z
2
value 0.09491
scoring_system epss
scoring_elements 0.92814
published_at 2026-04-04T12:55:00Z
3
value 0.09491
scoring_system epss
scoring_elements 0.92812
published_at 2026-04-07T12:55:00Z
4
value 0.09491
scoring_system epss
scoring_elements 0.92821
published_at 2026-04-08T12:55:00Z
5
value 0.09491
scoring_system epss
scoring_elements 0.92825
published_at 2026-04-09T12:55:00Z
6
value 0.09491
scoring_system epss
scoring_elements 0.92829
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243888
reference_id 1243888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243888
5
reference_url https://httpd.apache.org/security/json/CVE-2015-3185.json
reference_id CVE-2015-3185
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2015-3185.json
6
reference_url https://access.redhat.com/errata/RHSA-2015:1666
reference_id RHSA-2015:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1666
7
reference_url https://access.redhat.com/errata/RHSA-2015:1667
reference_id RHSA-2015:1667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1667
8
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
9
reference_url https://access.redhat.com/errata/RHSA-2017:2708
reference_id RHSA-2017:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2708
10
reference_url https://access.redhat.com/errata/RHSA-2017:2709
reference_id RHSA-2017:2709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2709
11
reference_url https://access.redhat.com/errata/RHSA-2017:2710
reference_id RHSA-2017:2710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2710
12
reference_url https://usn.ubuntu.com/2686-1/
reference_id USN-2686-1
reference_type
scores
url https://usn.ubuntu.com/2686-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
1
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
2
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2015-3185
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wuk-hwg1-6fa6
13
url VCID-4c3m-m6ku-kbhq
vulnerability_id VCID-4c3m-m6ku-kbhq
summary
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.

Special characters in the origin response header can truncate/split the response forwarded to the client.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27522.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27522
reference_id
reference_type
scores
0
value 0.00781
scoring_system epss
scoring_elements 0.7369
published_at 2026-04-13T12:55:00Z
1
value 0.00781
scoring_system epss
scoring_elements 0.73675
published_at 2026-04-04T12:55:00Z
2
value 0.00781
scoring_system epss
scoring_elements 0.73699
published_at 2026-04-12T12:55:00Z
3
value 0.00781
scoring_system epss
scoring_elements 0.73717
published_at 2026-04-11T12:55:00Z
4
value 0.00781
scoring_system epss
scoring_elements 0.73696
published_at 2026-04-09T12:55:00Z
5
value 0.00781
scoring_system epss
scoring_elements 0.73683
published_at 2026-04-08T12:55:00Z
6
value 0.00781
scoring_system epss
scoring_elements 0.73651
published_at 2026-04-02T12:55:00Z
7
value 0.00781
scoring_system epss
scoring_elements 0.73647
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27522
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/apache/httpd/commit/d753ea76b5972a85349b68c31b59d04c60014f2d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/httpd/commit/d753ea76b5972a85349b68c31b59d04c60014f2d
9
reference_url https://github.com/unbit/uwsgi
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/unbit/uwsgi
10
reference_url https://github.com/unbit/uwsgi/commit/58ee1df31fa9e9af106aaeabb82374c36b433822
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/unbit/uwsgi/commit/58ee1df31fa9e9af106aaeabb82374c36b433822
11
reference_url https://github.com/unbit/uwsgi/commit/acb03530aaaeaa810f28a5b64da619525940f569
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/unbit/uwsgi/commit/acb03530aaaeaa810f28a5b64da619525940f569
12
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-23T16:41:55Z/
url https://httpd.apache.org/security/vulnerabilities_24.html
13
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-23T16:41:55Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
14
reference_url https://security.gentoo.org/glsa/202309-01
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-23T16:41:55Z/
url https://security.gentoo.org/glsa/202309-01
15
reference_url https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.22.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://uwsgi-docs.readthedocs.io/en/latest/Changelog-2.0.22.html
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
reference_id 1032476
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176211
reference_id 2176211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176211
18
reference_url https://httpd.apache.org/security/json/CVE-2023-27522.json
reference_id CVE-2023-27522
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2023-27522.json
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27522
reference_id CVE-2023-27522
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-27522
20
reference_url https://github.com/advisories/GHSA-vcph-37mh-fqrh
reference_id GHSA-vcph-37mh-fqrh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vcph-37mh-fqrh
21
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
22
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
23
reference_url https://access.redhat.com/errata/RHSA-2023:5049
reference_id RHSA-2023:5049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5049
24
reference_url https://access.redhat.com/errata/RHSA-2023:5050
reference_id RHSA-2023:5050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5050
25
reference_url https://access.redhat.com/errata/RHSA-2023:6403
reference_id RHSA-2023:6403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6403
26
reference_url https://access.redhat.com/errata/RHSA-2024:4504
reference_id RHSA-2024:4504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4504
27
reference_url https://usn.ubuntu.com/5942-1/
reference_id USN-5942-1
reference_type
scores
url https://usn.ubuntu.com/5942-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2023-27522, GHSA-vcph-37mh-fqrh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c3m-m6ku-kbhq
14
url VCID-4d3t-es7p-9qhn
vulnerability_id VCID-4d3t-es7p-9qhn
summary Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28615.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28615
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.78149
published_at 2026-04-13T12:55:00Z
1
value 0.01111
scoring_system epss
scoring_elements 0.78114
published_at 2026-04-07T12:55:00Z
2
value 0.01111
scoring_system epss
scoring_elements 0.78131
published_at 2026-04-04T12:55:00Z
3
value 0.01111
scoring_system epss
scoring_elements 0.78101
published_at 2026-04-02T12:55:00Z
4
value 0.01111
scoring_system epss
scoring_elements 0.78153
published_at 2026-04-12T12:55:00Z
5
value 0.01111
scoring_system epss
scoring_elements 0.78171
published_at 2026-04-11T12:55:00Z
6
value 0.01111
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-09T12:55:00Z
7
value 0.01111
scoring_system epss
scoring_elements 0.7814
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28615
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
reference_id 1012513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2095006
reference_id 2095006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2095006
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/
reference_id 7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:26:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/
7
reference_url http://www.openwall.com/lists/oss-security/2022/06/08/9
reference_id 9
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:26:06Z/
url http://www.openwall.com/lists/oss-security/2022/06/08/9
8
reference_url https://security.archlinux.org/AVG-2763
reference_id AVG-2763
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2763
9
reference_url https://httpd.apache.org/security/json/CVE-2022-28615.json
reference_id CVE-2022-28615
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-28615.json
10
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:26:06Z/
url https://security.gentoo.org/glsa/202208-20
11
reference_url https://security.netapp.com/advisory/ntap-20220624-0005/
reference_id ntap-20220624-0005
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:26:06Z/
url https://security.netapp.com/advisory/ntap-20220624-0005/
12
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
13
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
14
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
15
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
16
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
17
reference_url https://usn.ubuntu.com/5487-1/
reference_id USN-5487-1
reference_type
scores
url https://usn.ubuntu.com/5487-1/
18
reference_url https://usn.ubuntu.com/5487-3/
reference_id USN-5487-3
reference_type
scores
url https://usn.ubuntu.com/5487-3/
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/
reference_id YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:26:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-28615
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d3t-es7p-9qhn
15
url VCID-4mqa-bkha-kbaj
vulnerability_id VCID-4mqa-bkha-kbaj
summary security update
references
0
reference_url http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
reference_id
reference_type
scores
url http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
1
reference_url http://code.google.com/p/chromium/issues/detail?id=139744
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=139744
2
reference_url http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
reference_id
reference_type
scores
url http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
3
reference_url http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.html
reference_id
reference_type
scores
url http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.html
4
reference_url http://jvn.jp/en/jp/JVN65273415/index.html
reference_id
reference_type
scores
url http://jvn.jp/en/jp/JVN65273415/index.html
5
reference_url http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html
10
reference_url http://marc.info/?l=bugtraq&m=136612293908376&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136612293908376&w=2
11
reference_url http://news.ycombinator.com/item?id=4510829
reference_id
reference_type
scores
url http://news.ycombinator.com/item?id=4510829
12
reference_url http://rhn.redhat.com/errata/RHSA-2013-0587.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0587.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4929.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4929.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4929
reference_id
reference_type
scores
0
value 0.13867
scoring_system epss
scoring_elements 0.94298
published_at 2026-04-13T12:55:00Z
1
value 0.13867
scoring_system epss
scoring_elements 0.94297
published_at 2026-04-12T12:55:00Z
2
value 0.15291
scoring_system epss
scoring_elements 0.94599
published_at 2026-04-04T12:55:00Z
3
value 0.15291
scoring_system epss
scoring_elements 0.94585
published_at 2026-04-01T12:55:00Z
4
value 0.15291
scoring_system epss
scoring_elements 0.94611
published_at 2026-04-08T12:55:00Z
5
value 0.15291
scoring_system epss
scoring_elements 0.94615
published_at 2026-04-09T12:55:00Z
6
value 0.15291
scoring_system epss
scoring_elements 0.94601
published_at 2026-04-07T12:55:00Z
7
value 0.15291
scoring_system epss
scoring_elements 0.94592
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4929
15
reference_url https://chromiumcodereview.appspot.com/10825183
reference_id
reference_type
scores
url https://chromiumcodereview.appspot.com/10825183
16
reference_url https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
reference_id
reference_type
scores
url https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
20
reference_url http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor
reference_id
reference_type
scores
url http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor
21
reference_url https://gist.github.com/3696912
reference_id
reference_type
scores
url https://gist.github.com/3696912
22
reference_url https://github.com/mpgn/CRIME-poc
reference_id
reference_type
scores
url https://github.com/mpgn/CRIME-poc
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920
24
reference_url https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212
reference_id
reference_type
scores
url https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212
25
reference_url http://support.apple.com/kb/HT5784
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5784
26
reference_url http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
reference_id
reference_type
scores
url http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
27
reference_url http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512
reference_id
reference_type
scores
url http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512
28
reference_url http://www.debian.org/security/2012/dsa-2579
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2579
29
reference_url http://www.debian.org/security/2013/dsa-2627
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2627
30
reference_url http://www.debian.org/security/2015/dsa-3253
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3253
31
reference_url http://www.ekoparty.org/2012/thai-duong.php
reference_id
reference_type
scores
url http://www.ekoparty.org/2012/thai-duong.php
32
reference_url http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091
reference_id
reference_type
scores
url http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091
33
reference_url http://www.securityfocus.com/bid/55704
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55704
34
reference_url http://www.theregister.co.uk/2012/09/14/crime_tls_attack/
reference_id
reference_type
scores
url http://www.theregister.co.uk/2012/09/14/crime_tls_attack/
35
reference_url http://www.ubuntu.com/usn/USN-1627-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1627-1
36
reference_url http://www.ubuntu.com/usn/USN-1628-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1628-1
37
reference_url http://www.ubuntu.com/usn/USN-1898-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1898-1
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689936
reference_id 689936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689936
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700399
reference_id 700399
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700399
40
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700426
reference_id 700426
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700426
41
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727197
reference_id 727197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727197
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728055
reference_id 728055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728055
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=857051
reference_id 857051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=857051
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4929
reference_id CVE-2012-4929
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4929
49
reference_url https://security.gentoo.org/glsa/201309-12
reference_id GLSA-201309-12
reference_type
scores
url https://security.gentoo.org/glsa/201309-12
50
reference_url https://access.redhat.com/errata/RHSA-2013:0587
reference_id RHSA-2013:0587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0587
51
reference_url https://access.redhat.com/errata/RHSA-2013:0636
reference_id RHSA-2013:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0636
52
reference_url https://access.redhat.com/errata/RHSA-2014:0416
reference_id RHSA-2014:0416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0416
53
reference_url https://usn.ubuntu.com/1627-1/
reference_id USN-1627-1
reference_type
scores
url https://usn.ubuntu.com/1627-1/
54
reference_url https://usn.ubuntu.com/1628-1/
reference_id USN-1628-1
reference_type
scores
url https://usn.ubuntu.com/1628-1/
55
reference_url https://usn.ubuntu.com/1898-1/
reference_id USN-1898-1
reference_type
scores
url https://usn.ubuntu.com/1898-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-4929
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mqa-bkha-kbaj
16
url VCID-4sss-a8ne-kqbc
vulnerability_id VCID-4sss-a8ne-kqbc
summary When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. A server that never enabled the h2 protocol or that only enabled it for https: and did not configure the "H2Upgrade on" is unaffected by this.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0197.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0197.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0197
reference_id
reference_type
scores
0
value 0.02193
scoring_system epss
scoring_elements 0.84326
published_at 2026-04-01T12:55:00Z
1
value 0.02193
scoring_system epss
scoring_elements 0.84397
published_at 2026-04-13T12:55:00Z
2
value 0.02193
scoring_system epss
scoring_elements 0.84408
published_at 2026-04-11T12:55:00Z
3
value 0.02193
scoring_system epss
scoring_elements 0.84401
published_at 2026-04-12T12:55:00Z
4
value 0.02193
scoring_system epss
scoring_elements 0.8434
published_at 2026-04-02T12:55:00Z
5
value 0.02193
scoring_system epss
scoring_elements 0.84361
published_at 2026-04-04T12:55:00Z
6
value 0.02193
scoring_system epss
scoring_elements 0.84363
published_at 2026-04-07T12:55:00Z
7
value 0.02193
scoring_system epss
scoring_elements 0.84385
published_at 2026-04-08T12:55:00Z
8
value 0.02193
scoring_system epss
scoring_elements 0.8439
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0197
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0197
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1695042
reference_id 1695042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1695042
4
reference_url https://security.archlinux.org/ASA-201904-3
reference_id ASA-201904-3
reference_type
scores
url https://security.archlinux.org/ASA-201904-3
5
reference_url https://security.archlinux.org/AVG-946
reference_id AVG-946
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-946
6
reference_url https://httpd.apache.org/security/json/CVE-2019-0197.json
reference_id CVE-2019-0197
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-0197.json
7
reference_url https://access.redhat.com/errata/RHSA-2019:3932
reference_id RHSA-2019:3932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3932
8
reference_url https://access.redhat.com/errata/RHSA-2019:3933
reference_id RHSA-2019:3933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3933
9
reference_url https://access.redhat.com/errata/RHSA-2019:3935
reference_id RHSA-2019:3935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3935
10
reference_url https://access.redhat.com/errata/RHSA-2020:2644
reference_id RHSA-2020:2644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2644
11
reference_url https://access.redhat.com/errata/RHSA-2020:2646
reference_id RHSA-2020:2646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2646
12
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
13
reference_url https://usn.ubuntu.com/4113-1/
reference_id USN-4113-1
reference_type
scores
url https://usn.ubuntu.com/4113-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2019-0197
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4sss-a8ne-kqbc
17
url VCID-53da-z9gn-n7f2
vulnerability_id VCID-53da-z9gn-n7f2
summary A flaw was found in mod_log_config. If the '%{cookiename}C' log format string is in use, a remote attacker could send a specific cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0021.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0021
reference_id
reference_type
scores
0
value 0.3296
scoring_system epss
scoring_elements 0.9689
published_at 2026-04-13T12:55:00Z
1
value 0.3296
scoring_system epss
scoring_elements 0.96858
published_at 2026-04-01T12:55:00Z
2
value 0.3296
scoring_system epss
scoring_elements 0.96866
published_at 2026-04-02T12:55:00Z
3
value 0.3296
scoring_system epss
scoring_elements 0.96871
published_at 2026-04-04T12:55:00Z
4
value 0.3296
scoring_system epss
scoring_elements 0.96875
published_at 2026-04-07T12:55:00Z
5
value 0.3296
scoring_system epss
scoring_elements 0.96884
published_at 2026-04-08T12:55:00Z
6
value 0.3296
scoring_system epss
scoring_elements 0.96885
published_at 2026-04-09T12:55:00Z
7
value 0.3296
scoring_system epss
scoring_elements 0.96888
published_at 2026-04-11T12:55:00Z
8
value 0.3296
scoring_system epss
scoring_elements 0.96889
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0021
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785065
reference_id 785065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785065
4
reference_url https://httpd.apache.org/security/json/CVE-2012-0021.json
reference_id CVE-2012-0021
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0021.json
5
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
6
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
7
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
8
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-0021
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53da-z9gn-n7f2
18
url VCID-5bej-9h7w-33c8
vulnerability_id VCID-5bej-9h7w-33c8
summary When an unrecognized HTTP Method is given in an <Limit {method}> directive in an .htaccess file, and that .htaccess file is processed by the corresponding request, the global methods table is corrupted in the current worker process, resulting in erratic behaviour. This behavior may be avoided by listing all unusual HTTP Methods in a global httpd.conf RegisterHttpMethod directive in httpd release 2.4.25 and later. To permit other .htaccess directives while denying the <Limit > directive, see the AllowOverrideList directive. Source code patch (2.4) is at; CVE-2017-9798-patch-2.4.patch Source code patch (2.2) is at; CVE-2017-9798-patch-2.2.patch Note 2.2 is end-of-life, no further release with this fix is planned. Users are encouraged to migrate to 2.4.28 or later for this and other fixes.
references
0
reference_url http://openwall.com/lists/oss-security/2017/09/18/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/09/18/2
1
reference_url https://access.redhat.com/errata/RHSA-2017:3113
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3113
2
reference_url https://access.redhat.com/errata/RHSA-2017:3114
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3114
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9798.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9798.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9798
reference_id
reference_type
scores
0
value 0.9384
scoring_system epss
scoring_elements 0.99862
published_at 2026-04-01T12:55:00Z
1
value 0.9384
scoring_system epss
scoring_elements 0.99865
published_at 2026-04-13T12:55:00Z
2
value 0.9384
scoring_system epss
scoring_elements 0.99864
published_at 2026-04-12T12:55:00Z
3
value 0.9384
scoring_system epss
scoring_elements 0.99863
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9798
5
reference_url https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
reference_id
reference_type
scores
url https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
6
reference_url https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch
reference_id
reference_type
scores
url https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798
8
reference_url http://seclists.org/fulldisclosure/2024/Sep/22
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2024/Sep/22
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a
reference_id
reference_type
scores
url https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a
11
reference_url https://github.com/hannob/optionsbleed
reference_id
reference_type
scores
url https://github.com/hannob/optionsbleed
12
reference_url https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798
13
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://security.netapp.com/advisory/ntap-20180601-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180601-0003/
32
reference_url https://security-tracker.debian.org/tracker/CVE-2017-9798
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2017-9798
33
reference_url https://support.apple.com/HT208331
reference_id
reference_type
scores
url https://support.apple.com/HT208331
34
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
35
reference_url https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch
reference_id
reference_type
scores
url https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch
36
reference_url https://www.exploit-db.com/exploits/42745/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/42745/
37
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
38
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
39
reference_url https://www.tenable.com/security/tns-2019-09
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2019-09
40
reference_url http://www.debian.org/security/2017/dsa-3980
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3980
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
43
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
44
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
45
reference_url http://www.securityfocus.com/bid/100872
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100872
46
reference_url http://www.securityfocus.com/bid/105598
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105598
47
reference_url http://www.securitytracker.com/id/1039387
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039387
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1490344
reference_id 1490344
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1490344
49
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876109
reference_id 876109
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876109
50
reference_url https://security.archlinux.org/ASA-201709-15
reference_id ASA-201709-15
reference_type
scores
url https://security.archlinux.org/ASA-201709-15
51
reference_url https://security.archlinux.org/AVG-404
reference_id AVG-404
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-404
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
74
reference_url https://httpd.apache.org/security/json/CVE-2017-9798.json
reference_id CVE-2017-9798
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-9798.json
75
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-9798
reference_id CVE-2017-9798
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-9798
76
reference_url https://github.com/hannob/optionsbleed/blob/e297ce13cfb0f338b2cabfb81a70349fd6925f82/optionsbleed
reference_id CVE-2017-9798;OPTIONSBLEED
reference_type exploit
scores
url https://github.com/hannob/optionsbleed/blob/e297ce13cfb0f338b2cabfb81a70349fd6925f82/optionsbleed
77
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/webapps/42745.py
reference_id CVE-2017-9798;OPTIONSBLEED
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/webapps/42745.py
78
reference_url https://security.gentoo.org/glsa/201710-32
reference_id GLSA-201710-32
reference_type
scores
url https://security.gentoo.org/glsa/201710-32
79
reference_url https://access.redhat.com/errata/RHSA-2017:2882
reference_id RHSA-2017:2882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2882
80
reference_url https://access.redhat.com/errata/RHSA-2017:2972
reference_id RHSA-2017:2972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2972
81
reference_url https://access.redhat.com/errata/RHSA-2017:3018
reference_id RHSA-2017:3018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3018
82
reference_url https://access.redhat.com/errata/RHSA-2017:3193
reference_id RHSA-2017:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3193
83
reference_url https://access.redhat.com/errata/RHSA-2017:3194
reference_id RHSA-2017:3194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3194
84
reference_url https://access.redhat.com/errata/RHSA-2017:3195
reference_id RHSA-2017:3195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3195
85
reference_url https://access.redhat.com/errata/RHSA-2017:3239
reference_id RHSA-2017:3239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3239
86
reference_url https://access.redhat.com/errata/RHSA-2017:3240
reference_id RHSA-2017:3240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3240
87
reference_url https://access.redhat.com/errata/RHSA-2017:3475
reference_id RHSA-2017:3475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3475
88
reference_url https://access.redhat.com/errata/RHSA-2017:3476
reference_id RHSA-2017:3476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3476
89
reference_url https://access.redhat.com/errata/RHSA-2017:3477
reference_id RHSA-2017:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3477
90
reference_url https://usn.ubuntu.com/3425-1/
reference_id USN-3425-1
reference_type
scores
url https://usn.ubuntu.com/3425-1/
91
reference_url https://usn.ubuntu.com/3425-2/
reference_id USN-3425-2
reference_type
scores
url https://usn.ubuntu.com/3425-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-9798
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5bej-9h7w-33c8
19
url VCID-5crp-xumw-v7gb
vulnerability_id VCID-5crp-xumw-v7gb
summary A NULL pointer dereference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. (Note that this vulnerability was fixed in the 2.4.7 release, but the security impact was not disclosed at the time of the release.)
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4352.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4352.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4352
reference_id
reference_type
scores
0
value 0.24352
scoring_system epss
scoring_elements 0.96101
published_at 2026-04-13T12:55:00Z
1
value 0.24352
scoring_system epss
scoring_elements 0.96062
published_at 2026-04-01T12:55:00Z
2
value 0.24352
scoring_system epss
scoring_elements 0.96095
published_at 2026-04-09T12:55:00Z
3
value 0.24352
scoring_system epss
scoring_elements 0.96098
published_at 2026-04-12T12:55:00Z
4
value 0.24352
scoring_system epss
scoring_elements 0.9607
published_at 2026-04-02T12:55:00Z
5
value 0.24352
scoring_system epss
scoring_elements 0.96077
published_at 2026-04-04T12:55:00Z
6
value 0.24352
scoring_system epss
scoring_elements 0.96082
published_at 2026-04-07T12:55:00Z
7
value 0.24352
scoring_system epss
scoring_elements 0.96092
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4352
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4352
4
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
16
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c
17
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c?r1=1491564&r2=1523235&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c?r1=1491564&r2=1523235&diff_format=h
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1120604
reference_id 1120604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1120604
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
20
reference_url https://httpd.apache.org/security/json/CVE-2013-4352.json
reference_id CVE-2013-4352
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2013-4352.json
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4352
reference_id CVE-2013-4352
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-4352
22
reference_url https://access.redhat.com/errata/RHSA-2014:0921
reference_id RHSA-2014:0921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0921
23
reference_url https://access.redhat.com/errata/RHSA-2014:0922
reference_id RHSA-2014:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0922
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2013-4352
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5crp-xumw-v7gb
20
url VCID-5qkp-3w54-j3a5
vulnerability_id VCID-5qkp-3w54-j3a5
summary A flaw in mod_session_dbd caused it to proceed with save operations for a session without considering the dirty flag and the requirement for a new session ID.
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2249.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2249.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2249
reference_id
reference_type
scores
0
value 0.43661
scoring_system epss
scoring_elements 0.97523
published_at 2026-04-13T12:55:00Z
1
value 0.43661
scoring_system epss
scoring_elements 0.97498
published_at 2026-04-01T12:55:00Z
2
value 0.43661
scoring_system epss
scoring_elements 0.9752
published_at 2026-04-11T12:55:00Z
3
value 0.43661
scoring_system epss
scoring_elements 0.97522
published_at 2026-04-12T12:55:00Z
4
value 0.43661
scoring_system epss
scoring_elements 0.97505
published_at 2026-04-02T12:55:00Z
5
value 0.43661
scoring_system epss
scoring_elements 0.97508
published_at 2026-04-04T12:55:00Z
6
value 0.43661
scoring_system epss
scoring_elements 0.9751
published_at 2026-04-07T12:55:00Z
7
value 0.43661
scoring_system epss
scoring_elements 0.97515
published_at 2026-04-08T12:55:00Z
8
value 0.43661
scoring_system epss
scoring_elements 0.97517
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2249
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249
4
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
5
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
18
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/session/mod_session_dbd.c?r1=1409170&r2=1488158&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/session/mod_session_dbd.c?r1=1409170&r2=1488158&diff_format=h
19
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-2249
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-2249
20
reference_url http://www.apache.org/dist/httpd/CHANGES_2.4.6
reference_id
reference_type
scores
url http://www.apache.org/dist/httpd/CHANGES_2.4.6
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=987543
reference_id 987543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=987543
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
23
reference_url https://httpd.apache.org/security/json/CVE-2013-2249.json
reference_id CVE-2013-2249
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2013-2249.json
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2249
reference_id CVE-2013-2249
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2249
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2013-2249
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qkp-3w54-j3a5
21
url VCID-5xrt-1n1q-4bey
vulnerability_id VCID-5xrt-1n1q-4bey
summary In Apache HTTP Server versions 2.4.0 to 2.4.41 some mod_rewrite configurations vulnerable to open redirect.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1927.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1927.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1927
reference_id
reference_type
scores
0
value 0.11302
scoring_system epss
scoring_elements 0.93495
published_at 2026-04-01T12:55:00Z
1
value 0.11302
scoring_system epss
scoring_elements 0.93527
published_at 2026-04-12T12:55:00Z
2
value 0.11302
scoring_system epss
scoring_elements 0.93511
published_at 2026-04-07T12:55:00Z
3
value 0.11302
scoring_system epss
scoring_elements 0.93519
published_at 2026-04-08T12:55:00Z
4
value 0.11302
scoring_system epss
scoring_elements 0.93522
published_at 2026-04-09T12:55:00Z
5
value 0.11302
scoring_system epss
scoring_elements 0.93528
published_at 2026-04-13T12:55:00Z
6
value 0.11302
scoring_system epss
scoring_elements 0.93504
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1927
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
8
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
9
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/
26
reference_url https://security.netapp.com/advisory/ntap-20200413-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200413-0002/
27
reference_url https://www.debian.org/security/2020/dsa-4757
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4757
28
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuApr2021.html
29
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
30
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2022.html
31
reference_url http://www.openwall.com/lists/oss-security/2020/04/03/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/04/03/1
32
reference_url http://www.openwall.com/lists/oss-security/2020/04/04/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/04/04/1
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1820761
reference_id 1820761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1820761
34
reference_url https://security.archlinux.org/ASA-202004-14
reference_id ASA-202004-14
reference_type
scores
url https://security.archlinux.org/ASA-202004-14
35
reference_url https://security.archlinux.org/AVG-1126
reference_id AVG-1126
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1126
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:sd-wan_aware:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:sd-wan_aware:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:sd-wan_aware:8.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:broadcom:brocade_fabric_operating_system:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:broadcom:brocade_fabric_operating_system:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:broadcom:brocade_fabric_operating_system:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
60
reference_url https://httpd.apache.org/security/json/CVE-2020-1927.json
reference_id CVE-2020-1927
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2020-1927.json
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1927
reference_id CVE-2020-1927
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-1927
62
reference_url https://access.redhat.com/errata/RHSA-2020:1336
reference_id RHSA-2020:1336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1336
63
reference_url https://access.redhat.com/errata/RHSA-2020:1337
reference_id RHSA-2020:1337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1337
64
reference_url https://access.redhat.com/errata/RHSA-2020:2263
reference_id RHSA-2020:2263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2263
65
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
66
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
67
reference_url https://usn.ubuntu.com/4458-1/
reference_id USN-4458-1
reference_type
scores
url https://usn.ubuntu.com/4458-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2020-1927
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xrt-1n1q-4bey
22
url VCID-5yez-d5nj-q7eq
vulnerability_id VCID-5yez-d5nj-q7eq
summary An integer overflow flaw was found which, when the mod_setenvif module is enabled, could allow local users to gain privileges via a .htaccess file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3607.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3607
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47455
published_at 2026-04-13T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47395
published_at 2026-04-01T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47429
published_at 2026-04-02T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.4745
published_at 2026-04-09T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47399
published_at 2026-04-07T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47454
published_at 2026-04-08T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47473
published_at 2026-04-11T12:55:00Z
7
value 0.00242
scoring_system epss
scoring_elements 0.47448
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=769844
reference_id 769844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=769844
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3607.json
reference_id CVE-2011-3607
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3607.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41769.txt
reference_id CVE-2011-4415;CVE-2011-3607
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41769.txt
6
reference_url http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
reference_id CVE-2011-4415;CVE-2011-3607
reference_type exploit
scores
url http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
10
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
11
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
12
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2011-3607
risk_score 4.2
exploitability 2.0
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yez-d5nj-q7eq
23
url VCID-66k7-maf9-dfcd
vulnerability_id VCID-66k7-maf9-dfcd
summary Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35452.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35452.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35452
reference_id
reference_type
scores
0
value 0.10695
scoring_system epss
scoring_elements 0.93289
published_at 2026-04-01T12:55:00Z
1
value 0.10695
scoring_system epss
scoring_elements 0.93319
published_at 2026-04-13T12:55:00Z
2
value 0.10695
scoring_system epss
scoring_elements 0.93315
published_at 2026-04-09T12:55:00Z
3
value 0.10695
scoring_system epss
scoring_elements 0.9332
published_at 2026-04-11T12:55:00Z
4
value 0.10695
scoring_system epss
scoring_elements 0.93318
published_at 2026-04-12T12:55:00Z
5
value 0.10695
scoring_system epss
scoring_elements 0.93297
published_at 2026-04-02T12:55:00Z
6
value 0.10695
scoring_system epss
scoring_elements 0.93303
published_at 2026-04-04T12:55:00Z
7
value 0.10695
scoring_system epss
scoring_elements 0.93302
published_at 2026-04-07T12:55:00Z
8
value 0.10695
scoring_system epss
scoring_elements 0.93311
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35452
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1966724
reference_id 1966724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1966724
9
reference_url https://security.archlinux.org/AVG-2053
reference_id AVG-2053
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2053
10
reference_url https://httpd.apache.org/security/json/CVE-2020-35452.json
reference_id CVE-2020-35452
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2020-35452.json
11
reference_url https://security.gentoo.org/glsa/202107-38
reference_id GLSA-202107-38
reference_type
scores
url https://security.gentoo.org/glsa/202107-38
12
reference_url https://access.redhat.com/errata/RHSA-2021:4613
reference_id RHSA-2021:4613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4613
13
reference_url https://access.redhat.com/errata/RHSA-2021:4614
reference_id RHSA-2021:4614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4614
14
reference_url https://access.redhat.com/errata/RHSA-2022:1915
reference_id RHSA-2022:1915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1915
15
reference_url https://usn.ubuntu.com/4994-1/
reference_id USN-4994-1
reference_type
scores
url https://usn.ubuntu.com/4994-1/
16
reference_url https://usn.ubuntu.com/4994-2/
reference_id USN-4994-2
reference_type
scores
url https://usn.ubuntu.com/4994-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2020-35452
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-66k7-maf9-dfcd
24
url VCID-6b7y-562y-suce
vulnerability_id VCID-6b7y-562y-suce
summary
Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected.

This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server.

This issue affected  mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31618.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31618
reference_id
reference_type
scores
0
value 0.11001
scoring_system epss
scoring_elements 0.93424
published_at 2026-04-12T12:55:00Z
1
value 0.11001
scoring_system epss
scoring_elements 0.934
published_at 2026-04-02T12:55:00Z
2
value 0.11001
scoring_system epss
scoring_elements 0.93416
published_at 2026-04-08T12:55:00Z
3
value 0.11001
scoring_system epss
scoring_elements 0.93392
published_at 2026-04-01T12:55:00Z
4
value 0.11001
scoring_system epss
scoring_elements 0.93408
published_at 2026-04-07T12:55:00Z
5
value 0.11001
scoring_system epss
scoring_elements 0.93425
published_at 2026-04-13T12:55:00Z
6
value 0.11001
scoring_system epss
scoring_elements 0.93419
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31618
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1968013
reference_id 1968013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1968013
9
reference_url http://www.openwall.com/lists/oss-security/2024/03/13/2
reference_id 2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url http://www.openwall.com/lists/oss-security/2024/03/13/2
10
reference_url https://seclists.org/oss-sec/2021/q2/206
reference_id 206
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url https://seclists.org/oss-sec/2021/q2/206
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NKJ3ZA3FTSZ2QBBPKS6BYGAWYRABNQQ/
reference_id 2NKJ3ZA3FTSZ2QBBPKS6BYGAWYRABNQQ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NKJ3ZA3FTSZ2QBBPKS6BYGAWYRABNQQ/
12
reference_url http://www.openwall.com/lists/oss-security/2021/06/10/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url http://www.openwall.com/lists/oss-security/2021/06/10/9
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989562
reference_id 989562
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989562
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A73QJ4HPUMU26I6EULG6SCK67TUEXZYR/
reference_id A73QJ4HPUMU26I6EULG6SCK67TUEXZYR
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A73QJ4HPUMU26I6EULG6SCK67TUEXZYR/
15
reference_url https://security.archlinux.org/ASA-202106-23
reference_id ASA-202106-23
reference_type
scores
url https://security.archlinux.org/ASA-202106-23
16
reference_url https://security.archlinux.org/AVG-2041
reference_id AVG-2041
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2041
17
reference_url https://httpd.apache.org/security/json/CVE-2021-31618.json
reference_id CVE-2021-31618
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-31618.json
18
reference_url https://www.debian.org/security/2021/dsa-4937
reference_id dsa-4937
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url https://www.debian.org/security/2021/dsa-4937
19
reference_url https://security.gentoo.org/glsa/202107-38
reference_id GLSA-202107-38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url https://security.gentoo.org/glsa/202107-38
20
reference_url https://security.netapp.com/advisory/ntap-20210727-0008/
reference_id ntap-20210727-0008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url https://security.netapp.com/advisory/ntap-20210727-0008/
21
reference_url https://lists.apache.org/thread.html/r14b66ef0f4f569fd515a3f96cd4eb58bd9a8ff525cc326bb0359664f%40%3Ccvs.httpd.apache.org%3E
reference_id r14b66ef0f4f569fd515a3f96cd4eb58bd9a8ff525cc326bb0359664f%40%3Ccvs.httpd.apache.org%3E
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url https://lists.apache.org/thread.html/r14b66ef0f4f569fd515a3f96cd4eb58bd9a8ff525cc326bb0359664f%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r783b6558abf3305b17ea462bed4bd66d82866438999bf38cef6d11d1%40%3Ccvs.httpd.apache.org%3E
reference_id r783b6558abf3305b17ea462bed4bd66d82866438999bf38cef6d11d1%40%3Ccvs.httpd.apache.org%3E
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-20T16:18:33Z/
url https://lists.apache.org/thread.html/r783b6558abf3305b17ea462bed4bd66d82866438999bf38cef6d11d1%40%3Ccvs.httpd.apache.org%3E
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-31618
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6b7y-562y-suce
25
url VCID-6bez-sgg8-cbbq
vulnerability_id VCID-6bez-sgg8-cbbq
summary Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled. Note: This issue is also known as CVE-2008-0455.
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00011.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html
5
reference_url http://mail-archives.apache.org/mod_mbox/www-announce/201208.mbox/%3C0BFFEA9B-801B-4BAA-9534-56F640268E30%40apache.org%3E
reference_id
reference_type
scores
url http://mail-archives.apache.org/mod_mbox/www-announce/201208.mbox/%3C0BFFEA9B-801B-4BAA-9534-56F640268E30%40apache.org%3E
6
reference_url http://marc.info/?l=bugtraq&m=136612293908376&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136612293908376&w=2
7
reference_url http://rhn.redhat.com/errata/RHSA-2012-1591.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1591.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2012-1592.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1592.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2012-1594.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1594.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2013-0130.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0130.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2687.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2687.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2687
reference_id
reference_type
scores
0
value 0.08268
scoring_system epss
scoring_elements 0.92237
published_at 2026-04-13T12:55:00Z
1
value 0.08268
scoring_system epss
scoring_elements 0.92204
published_at 2026-04-01T12:55:00Z
2
value 0.08268
scoring_system epss
scoring_elements 0.9224
published_at 2026-04-11T12:55:00Z
3
value 0.08268
scoring_system epss
scoring_elements 0.92241
published_at 2026-04-12T12:55:00Z
4
value 0.08268
scoring_system epss
scoring_elements 0.92211
published_at 2026-04-02T12:55:00Z
5
value 0.08268
scoring_system epss
scoring_elements 0.92217
published_at 2026-04-04T12:55:00Z
6
value 0.08268
scoring_system epss
scoring_elements 0.9222
published_at 2026-04-07T12:55:00Z
7
value 0.08268
scoring_system epss
scoring_elements 0.92231
published_at 2026-04-08T12:55:00Z
8
value 0.08268
scoring_system epss
scoring_elements 0.92234
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2687
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687
14
reference_url http://secunia.com/advisories/50894
reference_id
reference_type
scores
url http://secunia.com/advisories/50894
15
reference_url http://secunia.com/advisories/51607
reference_id
reference_type
scores
url http://secunia.com/advisories/51607
16
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18832
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18832
36
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19539
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19539
37
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
38
reference_url http://www-01.ibm.com/support/docview.wss?uid=nas2a2b50a0ca011b37c86257a96003c9a4f
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=nas2a2b50a0ca011b37c86257a96003c9a4f
39
reference_url http://www.apache.org/dist/httpd/CHANGES_2.4.3
reference_id
reference_type
scores
url http://www.apache.org/dist/httpd/CHANGES_2.4.3
40
reference_url http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
reference_id
reference_type
scores
url http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
41
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
42
reference_url http://www.securityfocus.com/bid/55131
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55131
43
reference_url http://www.ubuntu.com/usn/USN-1627-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1627-1
44
reference_url http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
reference_id
reference_type
scores
url http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=850794
reference_id 850794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=850794
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
71
reference_url https://httpd.apache.org/security/json/CVE-2012-2687.json
reference_id CVE-2012-2687
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-2687.json
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2687
reference_id CVE-2012-2687
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-2687
73
reference_url https://access.redhat.com/errata/RHSA-2012:1591
reference_id RHSA-2012:1591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1591
74
reference_url https://access.redhat.com/errata/RHSA-2012:1592
reference_id RHSA-2012:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1592
75
reference_url https://access.redhat.com/errata/RHSA-2012:1594
reference_id RHSA-2012:1594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1594
76
reference_url https://access.redhat.com/errata/RHSA-2013:0130
reference_id RHSA-2013:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0130
77
reference_url https://access.redhat.com/errata/RHSA-2013:0512
reference_id RHSA-2013:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0512
78
reference_url https://usn.ubuntu.com/1627-1/
reference_id USN-1627-1
reference_type
scores
url https://usn.ubuntu.com/1627-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-2687
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bez-sgg8-cbbq
26
url VCID-6pzx-1e5t-xbes
vulnerability_id VCID-6pzx-1e5t-xbes
summary XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6438.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6438
reference_id
reference_type
scores
0
value 0.30247
scoring_system epss
scoring_elements 0.96681
published_at 2026-04-13T12:55:00Z
1
value 0.30247
scoring_system epss
scoring_elements 0.96648
published_at 2026-04-01T12:55:00Z
2
value 0.30247
scoring_system epss
scoring_elements 0.96657
published_at 2026-04-02T12:55:00Z
3
value 0.30247
scoring_system epss
scoring_elements 0.96663
published_at 2026-04-04T12:55:00Z
4
value 0.30247
scoring_system epss
scoring_elements 0.96666
published_at 2026-04-07T12:55:00Z
5
value 0.30247
scoring_system epss
scoring_elements 0.96674
published_at 2026-04-08T12:55:00Z
6
value 0.30247
scoring_system epss
scoring_elements 0.96676
published_at 2026-04-09T12:55:00Z
7
value 0.30247
scoring_system epss
scoring_elements 0.96678
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077867
reference_id 1077867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077867
4
reference_url https://httpd.apache.org/security/json/CVE-2013-6438.json
reference_id CVE-2013-6438
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2013-6438.json
5
reference_url https://security.gentoo.org/glsa/201408-12
reference_id GLSA-201408-12
reference_type
scores
url https://security.gentoo.org/glsa/201408-12
6
reference_url https://access.redhat.com/errata/RHSA-2014:0369
reference_id RHSA-2014:0369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0369
7
reference_url https://access.redhat.com/errata/RHSA-2014:0370
reference_id RHSA-2014:0370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0370
8
reference_url https://access.redhat.com/errata/RHSA-2014:0783
reference_id RHSA-2014:0783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0783
9
reference_url https://access.redhat.com/errata/RHSA-2014:0784
reference_id RHSA-2014:0784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0784
10
reference_url https://access.redhat.com/errata/RHSA-2014:0825
reference_id RHSA-2014:0825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0825
11
reference_url https://access.redhat.com/errata/RHSA-2014:0826
reference_id RHSA-2014:0826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0826
12
reference_url https://usn.ubuntu.com/2152-1/
reference_id USN-2152-1
reference_type
scores
url https://usn.ubuntu.com/2152-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2013-6438
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzx-1e5t-xbes
27
url VCID-6qk8-1cj1-4fh7
vulnerability_id VCID-6qk8-1cj1-4fh7
summary Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36760.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36760
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.52542
published_at 2026-04-13T12:55:00Z
1
value 0.00291
scoring_system epss
scoring_elements 0.52508
published_at 2026-04-04T12:55:00Z
2
value 0.00291
scoring_system epss
scoring_elements 0.52475
published_at 2026-04-07T12:55:00Z
3
value 0.00291
scoring_system epss
scoring_elements 0.52528
published_at 2026-04-08T12:55:00Z
4
value 0.00291
scoring_system epss
scoring_elements 0.52522
published_at 2026-04-09T12:55:00Z
5
value 0.00291
scoring_system epss
scoring_elements 0.52573
published_at 2026-04-11T12:55:00Z
6
value 0.00291
scoring_system epss
scoring_elements 0.52558
published_at 2026-04-12T12:55:00Z
7
value 0.00291
scoring_system epss
scoring_elements 0.52481
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161777
reference_id 2161777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161777
9
reference_url https://security.archlinux.org/AVG-2824
reference_id AVG-2824
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2824
10
reference_url https://httpd.apache.org/security/json/CVE-2022-36760.json
reference_id CVE-2022-36760
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2022-36760.json
11
reference_url https://access.redhat.com/errata/RHSA-2023:0852
reference_id RHSA-2023:0852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0852
12
reference_url https://access.redhat.com/errata/RHSA-2023:0970
reference_id RHSA-2023:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0970
13
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
14
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
15
reference_url https://usn.ubuntu.com/5834-1/
reference_id USN-5834-1
reference_type
scores
url https://usn.ubuntu.com/5834-1/
16
reference_url https://usn.ubuntu.com/5839-1/
reference_id USN-5839-1
reference_type
scores
url https://usn.ubuntu.com/5839-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-36760
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qk8-1cj1-4fh7
28
url VCID-6tgh-b4td-63f5
vulnerability_id VCID-6tgh-b4td-63f5
summary
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39573.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39573
reference_id
reference_type
scores
0
value 0.0316
scoring_system epss
scoring_elements 0.86917
published_at 2026-04-13T12:55:00Z
1
value 0.0316
scoring_system epss
scoring_elements 0.86886
published_at 2026-04-07T12:55:00Z
2
value 0.0316
scoring_system epss
scoring_elements 0.86906
published_at 2026-04-08T12:55:00Z
3
value 0.0316
scoring_system epss
scoring_elements 0.86914
published_at 2026-04-09T12:55:00Z
4
value 0.0316
scoring_system epss
scoring_elements 0.86927
published_at 2026-04-11T12:55:00Z
5
value 0.0316
scoring_system epss
scoring_elements 0.86923
published_at 2026-04-12T12:55:00Z
6
value 0.0316
scoring_system epss
scoring_elements 0.86873
published_at 2026-04-02T12:55:00Z
7
value 0.0316
scoring_system epss
scoring_elements 0.86891
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295022
reference_id 2295022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295022
11
reference_url https://httpd.apache.org/security/json/CVE-2024-39573.json
reference_id CVE-2024-39573
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-39573.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-01T20:41:48Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:4720
reference_id RHSA-2024:4720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4720
15
reference_url https://access.redhat.com/errata/RHSA-2024:4726
reference_id RHSA-2024:4726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4726
16
reference_url https://access.redhat.com/errata/RHSA-2024:5001
reference_id RHSA-2024:5001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5001
17
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
18
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
19
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-39573
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tgh-b4td-63f5
29
url VCID-6vxq-uxxw-ybeh
vulnerability_id VCID-6vxq-uxxw-ybeh
summary Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparision when determining the method of a request and thus process the request incorrectly.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0196.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0196
reference_id
reference_type
scores
0
value 0.09496
scoring_system epss
scoring_elements 0.92804
published_at 2026-04-01T12:55:00Z
1
value 0.09496
scoring_system epss
scoring_elements 0.9283
published_at 2026-04-12T12:55:00Z
2
value 0.09496
scoring_system epss
scoring_elements 0.92823
published_at 2026-04-08T12:55:00Z
3
value 0.09496
scoring_system epss
scoring_elements 0.92827
published_at 2026-04-09T12:55:00Z
4
value 0.09496
scoring_system epss
scoring_elements 0.92831
published_at 2026-04-13T12:55:00Z
5
value 0.09496
scoring_system epss
scoring_elements 0.92811
published_at 2026-04-02T12:55:00Z
6
value 0.09496
scoring_system epss
scoring_elements 0.92816
published_at 2026-04-04T12:55:00Z
7
value 0.09496
scoring_system epss
scoring_elements 0.92814
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1695030
reference_id 1695030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1695030
10
reference_url https://security.archlinux.org/ASA-201904-3
reference_id ASA-201904-3
reference_type
scores
url https://security.archlinux.org/ASA-201904-3
11
reference_url https://security.archlinux.org/AVG-946
reference_id AVG-946
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-946
12
reference_url https://httpd.apache.org/security/json/CVE-2019-0196.json
reference_id CVE-2019-0196
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-0196.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:3932
reference_id RHSA-2019:3932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3932
14
reference_url https://access.redhat.com/errata/RHSA-2019:3933
reference_id RHSA-2019:3933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3933
15
reference_url https://access.redhat.com/errata/RHSA-2019:3935
reference_id RHSA-2019:3935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3935
16
reference_url https://access.redhat.com/errata/RHSA-2020:2644
reference_id RHSA-2020:2644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2644
17
reference_url https://access.redhat.com/errata/RHSA-2020:2646
reference_id RHSA-2020:2646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2646
18
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
19
reference_url https://usn.ubuntu.com/3937-1/
reference_id USN-3937-1
reference_type
scores
url https://usn.ubuntu.com/3937-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2019-0196
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vxq-uxxw-ybeh
30
url VCID-6vze-zk58-7yep
vulnerability_id VCID-6vze-zk58-7yep
summary A flaw was found when mod_proxy_ajp is used together with mod_proxy_balancer. Given a specific configuration, a remote attacker could send certain malformed HTTP requests, putting a backend server into an error state until the retry timeout expired. This could lead to a temporary denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3348.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3348.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3348
reference_id
reference_type
scores
0
value 0.34026
scoring_system epss
scoring_elements 0.96969
published_at 2026-04-13T12:55:00Z
1
value 0.34026
scoring_system epss
scoring_elements 0.9694
published_at 2026-04-01T12:55:00Z
2
value 0.34026
scoring_system epss
scoring_elements 0.96947
published_at 2026-04-02T12:55:00Z
3
value 0.34026
scoring_system epss
scoring_elements 0.96952
published_at 2026-04-04T12:55:00Z
4
value 0.34026
scoring_system epss
scoring_elements 0.96955
published_at 2026-04-07T12:55:00Z
5
value 0.34026
scoring_system epss
scoring_elements 0.96963
published_at 2026-04-08T12:55:00Z
6
value 0.34026
scoring_system epss
scoring_elements 0.96964
published_at 2026-04-09T12:55:00Z
7
value 0.34026
scoring_system epss
scoring_elements 0.96967
published_at 2026-04-11T12:55:00Z
8
value 0.34026
scoring_system epss
scoring_elements 0.96968
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3348
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=736690
reference_id 736690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=736690
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3348.json
reference_id CVE-2011-3348
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3348.json
5
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
6
reference_url https://access.redhat.com/errata/RHSA-2011:1391
reference_id RHSA-2011:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1391
7
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
8
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
9
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2011-3348
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vze-zk58-7yep
31
url VCID-741u-yuv6-nkcy
vulnerability_id VCID-741u-yuv6-nkcy
summary Multiple vulnerabilities have been discovered in Apache.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0455.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0455.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-0455
reference_id
reference_type
scores
0
value 0.5197
scoring_system epss
scoring_elements 0.9789
published_at 2026-04-01T12:55:00Z
1
value 0.5197
scoring_system epss
scoring_elements 0.97895
published_at 2026-04-02T12:55:00Z
2
value 0.5197
scoring_system epss
scoring_elements 0.97897
published_at 2026-04-04T12:55:00Z
3
value 0.5197
scoring_system epss
scoring_elements 0.979
published_at 2026-04-07T12:55:00Z
4
value 0.5197
scoring_system epss
scoring_elements 0.97905
published_at 2026-04-08T12:55:00Z
5
value 0.5197
scoring_system epss
scoring_elements 0.97908
published_at 2026-04-09T12:55:00Z
6
value 0.5197
scoring_system epss
scoring_elements 0.97911
published_at 2026-04-11T12:55:00Z
7
value 0.5197
scoring_system epss
scoring_elements 0.97912
published_at 2026-04-12T12:55:00Z
8
value 0.5197
scoring_system epss
scoring_elements 0.97913
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-0455
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0455
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=850794
reference_id 850794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=850794
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31052.java
reference_id CVE-2008-0455;OSVDB-41019
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31052.java
5
reference_url https://www.securityfocus.com/bid/27409/info
reference_id CVE-2008-0455;OSVDB-41019
reference_type exploit
scores
url https://www.securityfocus.com/bid/27409/info
6
reference_url https://security.gentoo.org/glsa/200803-19
reference_id GLSA-200803-19
reference_type
scores
url https://security.gentoo.org/glsa/200803-19
7
reference_url https://access.redhat.com/errata/RHSA-2012:1591
reference_id RHSA-2012:1591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1591
8
reference_url https://access.redhat.com/errata/RHSA-2012:1592
reference_id RHSA-2012:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1592
9
reference_url https://access.redhat.com/errata/RHSA-2012:1594
reference_id RHSA-2012:1594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1594
10
reference_url https://access.redhat.com/errata/RHSA-2013:0130
reference_id RHSA-2013:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0130
11
reference_url https://access.redhat.com/errata/RHSA-2013:0512
reference_id RHSA-2013:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0512
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2008-0455
risk_score 1.0
exploitability 2.0
weighted_severity 0.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-741u-yuv6-nkcy
32
url VCID-7u2r-egf2-vfhx
vulnerability_id VCID-7u2r-egf2-vfhx
summary By sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17189.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17189
reference_id
reference_type
scores
0
value 0.05616
scoring_system epss
scoring_elements 0.90289
published_at 2026-04-01T12:55:00Z
1
value 0.05616
scoring_system epss
scoring_elements 0.90332
published_at 2026-04-13T12:55:00Z
2
value 0.05616
scoring_system epss
scoring_elements 0.9031
published_at 2026-04-07T12:55:00Z
3
value 0.05616
scoring_system epss
scoring_elements 0.90324
published_at 2026-04-08T12:55:00Z
4
value 0.05616
scoring_system epss
scoring_elements 0.90331
published_at 2026-04-09T12:55:00Z
5
value 0.05616
scoring_system epss
scoring_elements 0.90339
published_at 2026-04-11T12:55:00Z
6
value 0.05616
scoring_system epss
scoring_elements 0.90338
published_at 2026-04-12T12:55:00Z
7
value 0.05616
scoring_system epss
scoring_elements 0.90292
published_at 2026-04-02T12:55:00Z
8
value 0.05616
scoring_system epss
scoring_elements 0.90305
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
10
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY7SJQOO3PYFVINZW6H5EK4EZ3HSGZNM/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY7SJQOO3PYFVINZW6H5EK4EZ3HSGZNM/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7N3DUEBFVGQWQEME5HTPTTKDHGHBAC6/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7N3DUEBFVGQWQEME5HTPTTKDHGHBAC6/
24
reference_url https://seclists.org/bugtraq/2019/Apr/5
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/5
25
reference_url https://security.gentoo.org/glsa/201903-21
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201903-21
26
reference_url https://security.netapp.com/advisory/ntap-20190125-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190125-0001/
27
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
28
reference_url https://www.debian.org/security/2019/dsa-4422
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4422
29
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
30
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
31
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
32
reference_url https://www.tenable.com/security/tns-2019-09
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2019-09
33
reference_url http://www.securityfocus.com/bid/106685
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106685
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1668497
reference_id 1668497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1668497
35
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920302
reference_id 920302
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920302
36
reference_url https://security.archlinux.org/ASA-201901-14
reference_id ASA-201901-14
reference_type
scores
url https://security.archlinux.org/ASA-201901-14
37
reference_url https://security.archlinux.org/AVG-857
reference_id AVG-857
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-857
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.28:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.29:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.30:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
73
reference_url https://httpd.apache.org/security/json/CVE-2018-17189.json
reference_id CVE-2018-17189
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-17189.json
74
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-17189
reference_id CVE-2018-17189
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-17189
75
reference_url https://access.redhat.com/errata/RHSA-2019:3932
reference_id RHSA-2019:3932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3932
76
reference_url https://access.redhat.com/errata/RHSA-2019:3933
reference_id RHSA-2019:3933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3933
77
reference_url https://access.redhat.com/errata/RHSA-2019:3935
reference_id RHSA-2019:3935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3935
78
reference_url https://access.redhat.com/errata/RHSA-2019:4126
reference_id RHSA-2019:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4126
79
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
80
reference_url https://usn.ubuntu.com/3937-1/
reference_id USN-3937-1
reference_type
scores
url https://usn.ubuntu.com/3937-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-17189
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7u2r-egf2-vfhx
33
url VCID-7vfk-1dwm-xbbt
vulnerability_id VCID-7vfk-1dwm-xbbt
summary When mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10097.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10097.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10097
reference_id
reference_type
scores
0
value 0.22907
scoring_system epss
scoring_elements 0.95861
published_at 2026-04-01T12:55:00Z
1
value 0.22907
scoring_system epss
scoring_elements 0.95896
published_at 2026-04-13T12:55:00Z
2
value 0.22907
scoring_system epss
scoring_elements 0.95881
published_at 2026-04-07T12:55:00Z
3
value 0.22907
scoring_system epss
scoring_elements 0.95889
published_at 2026-04-08T12:55:00Z
4
value 0.22907
scoring_system epss
scoring_elements 0.95892
published_at 2026-04-09T12:55:00Z
5
value 0.22907
scoring_system epss
scoring_elements 0.95895
published_at 2026-04-12T12:55:00Z
6
value 0.22907
scoring_system epss
scoring_elements 0.95869
published_at 2026-04-02T12:55:00Z
7
value 0.22907
scoring_system epss
scoring_elements 0.95877
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10097
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
5
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
17
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
18
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2020.html
19
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743996
reference_id 1743996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743996
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
41
reference_url https://httpd.apache.org/security/json/CVE-2019-10097.json
reference_id CVE-2019-10097
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-10097.json
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10097
reference_id CVE-2019-10097
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10097
43
reference_url https://security.gentoo.org/glsa/201909-04
reference_id GLSA-201909-04
reference_type
scores
url https://security.gentoo.org/glsa/201909-04
44
reference_url https://access.redhat.com/errata/RHSA-2019:4126
reference_id RHSA-2019:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4126
45
reference_url https://access.redhat.com/errata/RHSA-2020:1336
reference_id RHSA-2020:1336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1336
46
reference_url https://access.redhat.com/errata/RHSA-2020:1337
reference_id RHSA-2020:1337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1337
47
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
48
reference_url https://usn.ubuntu.com/4113-1/
reference_id USN-4113-1
reference_type
scores
url https://usn.ubuntu.com/4113-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2019-10097
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vfk-1dwm-xbbt
34
url VCID-7vjg-vetg-p7f6
vulnerability_id VCID-7vjg-vetg-p7f6
summary A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0190.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0190
reference_id
reference_type
scores
0
value 0.17386
scoring_system epss
scoring_elements 0.95031
published_at 2026-04-01T12:55:00Z
1
value 0.17386
scoring_system epss
scoring_elements 0.95065
published_at 2026-04-13T12:55:00Z
2
value 0.17386
scoring_system epss
scoring_elements 0.95052
published_at 2026-04-08T12:55:00Z
3
value 0.17386
scoring_system epss
scoring_elements 0.95056
published_at 2026-04-09T12:55:00Z
4
value 0.17386
scoring_system epss
scoring_elements 0.95061
published_at 2026-04-11T12:55:00Z
5
value 0.17386
scoring_system epss
scoring_elements 0.95063
published_at 2026-04-12T12:55:00Z
6
value 0.17386
scoring_system epss
scoring_elements 0.95042
published_at 2026-04-04T12:55:00Z
7
value 0.17386
scoring_system epss
scoring_elements 0.95045
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0190
3
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
4
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://security.gentoo.org/glsa/201903-21
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201903-21
18
reference_url https://security.netapp.com/advisory/ntap-20190125-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190125-0001/
19
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
url https://www.oracle.com//security-alerts/cpujul2021.html
20
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
21
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
22
reference_url http://www.securityfocus.com/bid/106743
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106743
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1668488
reference_id 1668488
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1668488
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920220
reference_id 920220
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920220
25
reference_url https://security.archlinux.org/ASA-201901-14
reference_id ASA-201901-14
reference_type
scores
url https://security.archlinux.org/ASA-201901-14
26
reference_url https://security.archlinux.org/AVG-857
reference_id AVG-857
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-857
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
37
reference_url https://httpd.apache.org/security/json/CVE-2019-0190.json
reference_id CVE-2019-0190
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-0190.json
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-0190
reference_id CVE-2019-0190
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-0190
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2019-0190
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vjg-vetg-p7f6
35
url VCID-7zer-dq7c-8ffq
vulnerability_id VCID-7zer-dq7c-8ffq
summary For configurations enabling support for HTTP/2, SSL client certificate validation was not enforced if configured, allowing clients unauthorized access to protected resources over HTTP/2. This issue affected releases 2.4.18 and 2.4.20 only.
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
1
reference_url http://packetstormsecurity.com/files/137771/Apache-2.4.20-X509-Authentication-Bypass.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/137771/Apache-2.4.20-X509-Authentication-Bypass.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4979.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4979.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4979
reference_id
reference_type
scores
0
value 0.1736
scoring_system epss
scoring_elements 0.95022
published_at 2026-04-01T12:55:00Z
1
value 0.1736
scoring_system epss
scoring_elements 0.95057
published_at 2026-04-13T12:55:00Z
2
value 0.1736
scoring_system epss
scoring_elements 0.95044
published_at 2026-04-08T12:55:00Z
3
value 0.1736
scoring_system epss
scoring_elements 0.95048
published_at 2026-04-09T12:55:00Z
4
value 0.1736
scoring_system epss
scoring_elements 0.95053
published_at 2026-04-11T12:55:00Z
5
value 0.1736
scoring_system epss
scoring_elements 0.95055
published_at 2026-04-12T12:55:00Z
6
value 0.1736
scoring_system epss
scoring_elements 0.95033
published_at 2026-04-02T12:55:00Z
7
value 0.1736
scoring_system epss
scoring_elements 0.95034
published_at 2026-04-04T12:55:00Z
8
value 0.1736
scoring_system epss
scoring_elements 0.95036
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4979
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4979
5
reference_url http://seclists.org/fulldisclosure/2016/Jul/11
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2016/Jul/11
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/apache/httpd/commit/2d0e4eff04ea963128a41faaef21f987272e05a2
reference_id
reference_type
scores
url https://github.com/apache/httpd/commit/2d0e4eff04ea963128a41faaef21f987272e05a2
8
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://security.netapp.com/advisory/ntap-20180601-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180601-0001/
21
reference_url http://www.apache.org/dist/httpd/CHANGES_2.4
reference_id
reference_type
scores
url http://www.apache.org/dist/httpd/CHANGES_2.4
22
reference_url http://www.openwall.com/lists/oss-security/2016/07/05/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/07/05/5
23
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
24
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
25
reference_url http://www.securityfocus.com/bid/91566
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91566
26
reference_url http://www.securitytracker.com/id/1036225
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036225
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1352476
reference_id 1352476
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1352476
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*
31
reference_url https://httpd.apache.org/security/json/CVE-2016-4979.json
reference_id CVE-2016-4979
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2016-4979.json
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4979
reference_id CVE-2016-4979
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-4979
33
reference_url https://security.gentoo.org/glsa/201610-02
reference_id GLSA-201610-02
reference_type
scores
url https://security.gentoo.org/glsa/201610-02
34
reference_url https://access.redhat.com/errata/RHSA-2016:1420
reference_id RHSA-2016:1420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1420
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2016-4979
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7zer-dq7c-8ffq
36
url VCID-8axm-4anr-27ht
vulnerability_id VCID-8axm-4anr-27ht
summary Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-1156.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1156.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1207.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1207.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1208.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1208.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1209.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1209.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1896.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1896.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1896
reference_id
reference_type
scores
0
value 0.38555
scoring_system epss
scoring_elements 0.97242
published_at 2026-04-13T12:55:00Z
1
value 0.38555
scoring_system epss
scoring_elements 0.97214
published_at 2026-04-01T12:55:00Z
2
value 0.38555
scoring_system epss
scoring_elements 0.97237
published_at 2026-04-09T12:55:00Z
3
value 0.38555
scoring_system epss
scoring_elements 0.9724
published_at 2026-04-11T12:55:00Z
4
value 0.38555
scoring_system epss
scoring_elements 0.97219
published_at 2026-04-02T12:55:00Z
5
value 0.38555
scoring_system epss
scoring_elements 0.97225
published_at 2026-04-04T12:55:00Z
6
value 0.38555
scoring_system epss
scoring_elements 0.97226
published_at 2026-04-07T12:55:00Z
7
value 0.38555
scoring_system epss
scoring_elements 0.97236
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1896
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
10
reference_url http://secunia.com/advisories/55032
reference_id
reference_type
scores
url http://secunia.com/advisories/55032
11
reference_url https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
reference_id
reference_type
scores
url https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
12
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
13
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747
34
reference_url http://support.apple.com/kb/HT6150
reference_id
reference_type
scores
url http://support.apple.com/kb/HT6150
35
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h
36
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log
37
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896
38
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
39
reference_url http://www.apache.org/dist/httpd/Announcement2.2.html
reference_id
reference_type
scores
url http://www.apache.org/dist/httpd/Announcement2.2.html
40
reference_url http://www.securityfocus.com/bid/61129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/61129
41
reference_url http://www.ubuntu.com/usn/USN-1903-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1903-1
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717272
reference_id 717272
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717272
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=983549
reference_id 983549
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=983549
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://httpd.apache.org/security/json/CVE-2013-1896.json
reference_id CVE-2013-1896
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2013-1896.json
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1896
reference_id CVE-2013-1896
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1896
68
reference_url https://security.gentoo.org/glsa/201309-12
reference_id GLSA-201309-12
reference_type
scores
url https://security.gentoo.org/glsa/201309-12
69
reference_url https://access.redhat.com/errata/RHSA-2013:1133
reference_id RHSA-2013:1133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1133
70
reference_url https://access.redhat.com/errata/RHSA-2013:1134
reference_id RHSA-2013:1134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1134
71
reference_url https://access.redhat.com/errata/RHSA-2013:1156
reference_id RHSA-2013:1156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1156
72
reference_url https://access.redhat.com/errata/RHSA-2013:1207
reference_id RHSA-2013:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1207
73
reference_url https://access.redhat.com/errata/RHSA-2013:1208
reference_id RHSA-2013:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1208
74
reference_url https://access.redhat.com/errata/RHSA-2013:1209
reference_id RHSA-2013:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1209
75
reference_url https://usn.ubuntu.com/1903-1/
reference_id USN-1903-1
reference_type
scores
url https://usn.ubuntu.com/1903-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2013-1896
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8axm-4anr-27ht
37
url VCID-8edq-8rvq-rkf1
vulnerability_id VCID-8edq-8rvq-rkf1
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38475.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38475.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38475
reference_id
reference_type
scores
0
value 0.93858
scoring_system epss
scoring_elements 0.99869
published_at 2026-04-13T12:55:00Z
1
value 0.93858
scoring_system epss
scoring_elements 0.99867
published_at 2026-04-09T12:55:00Z
2
value 0.93858
scoring_system epss
scoring_elements 0.99868
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38475
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295014
reference_id 2295014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295014
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38475.json
reference_id CVE-2024-38475
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38475.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-05-02T03:55:18Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:4719
reference_id RHSA-2024:4719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4719
15
reference_url https://access.redhat.com/errata/RHSA-2024:4720
reference_id RHSA-2024:4720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4720
16
reference_url https://access.redhat.com/errata/RHSA-2024:4726
reference_id RHSA-2024:4726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4726
17
reference_url https://access.redhat.com/errata/RHSA-2024:4820
reference_id RHSA-2024:4820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4820
18
reference_url https://access.redhat.com/errata/RHSA-2024:4827
reference_id RHSA-2024:4827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4827
19
reference_url https://access.redhat.com/errata/RHSA-2024:4830
reference_id RHSA-2024:4830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4830
20
reference_url https://access.redhat.com/errata/RHSA-2024:4862
reference_id RHSA-2024:4862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4862
21
reference_url https://access.redhat.com/errata/RHSA-2024:4863
reference_id RHSA-2024:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4863
22
reference_url https://access.redhat.com/errata/RHSA-2024:4938
reference_id RHSA-2024:4938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4938
23
reference_url https://access.redhat.com/errata/RHSA-2024:4943
reference_id RHSA-2024:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4943
24
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
25
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
26
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
27
reference_url https://usn.ubuntu.com/6885-3/
reference_id USN-6885-3
reference_type
scores
url https://usn.ubuntu.com/6885-3/
28
reference_url https://usn.ubuntu.com/6885-5/
reference_id USN-6885-5
reference_type
scores
url https://usn.ubuntu.com/6885-5/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-38475
risk_score 10.0
exploitability 2.0
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8edq-8rvq-rkf1
38
url VCID-8eqf-c42n-y7dt
vulnerability_id VCID-8eqf-c42n-y7dt
summary An out-of-bounds memory read was found in mod_proxy_fcgi. A malicious FastCGI server could send a carefully crafted response which could lead to a crash when reading past the end of a heap memory or stack buffer. This issue affects version 2.4.10 only.
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-1855.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1855.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3583.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3583.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3583
reference_id
reference_type
scores
0
value 0.41813
scoring_system epss
scoring_elements 0.97423
published_at 2026-04-13T12:55:00Z
1
value 0.41813
scoring_system epss
scoring_elements 0.97397
published_at 2026-04-01T12:55:00Z
2
value 0.41813
scoring_system epss
scoring_elements 0.97419
published_at 2026-04-09T12:55:00Z
3
value 0.41813
scoring_system epss
scoring_elements 0.97421
published_at 2026-04-11T12:55:00Z
4
value 0.41813
scoring_system epss
scoring_elements 0.97404
published_at 2026-04-02T12:55:00Z
5
value 0.41813
scoring_system epss
scoring_elements 0.97408
published_at 2026-04-04T12:55:00Z
6
value 0.41813
scoring_system epss
scoring_elements 0.97411
published_at 2026-04-07T12:55:00Z
7
value 0.41813
scoring_system epss
scoring_elements 0.97417
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3583
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583
7
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://support.apple.com/HT205219
reference_id
reference_type
scores
url https://support.apple.com/HT205219
21
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
22
reference_url http://svn.apache.org/viewvc?view=revision&revision=1638818
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=revision&revision=1638818
23
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
24
reference_url http://www.securityfocus.com/bid/71657
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71657
25
reference_url http://www.ubuntu.com/usn/USN-2523-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2523-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1163555
reference_id 1163555
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1163555
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.9.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:os_x_server:5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:os_x_server:5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:os_x_server:5.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
39
reference_url https://httpd.apache.org/security/json/CVE-2014-3583.json
reference_id CVE-2014-3583
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2014-3583.json
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3583
reference_id CVE-2014-3583
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3583
41
reference_url https://security.gentoo.org/glsa/201701-36
reference_id GLSA-201701-36
reference_type
scores
url https://security.gentoo.org/glsa/201701-36
42
reference_url https://access.redhat.com/errata/RHSA-2015:1855
reference_id RHSA-2015:1855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1855
43
reference_url https://access.redhat.com/errata/RHSA-2015:1858
reference_id RHSA-2015:1858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1858
44
reference_url https://usn.ubuntu.com/2523-1/
reference_id USN-2523-1
reference_type
scores
url https://usn.ubuntu.com/2523-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2014-3583
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8eqf-c42n-y7dt
39
url VCID-8gcm-7q3n-q7bm
vulnerability_id VCID-8gcm-7q3n-q7bm
summary Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4975.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4975
reference_id
reference_type
scores
0
value 0.73272
scoring_system epss
scoring_elements 0.98788
published_at 2026-04-09T12:55:00Z
1
value 0.73272
scoring_system epss
scoring_elements 0.98789
published_at 2026-04-08T12:55:00Z
2
value 0.73272
scoring_system epss
scoring_elements 0.98791
published_at 2026-04-11T12:55:00Z
3
value 0.73272
scoring_system epss
scoring_elements 0.98793
published_at 2026-04-13T12:55:00Z
4
value 0.73272
scoring_system epss
scoring_elements 0.98792
published_at 2026-04-12T12:55:00Z
5
value 0.75341
scoring_system epss
scoring_elements 0.9888
published_at 2026-04-04T12:55:00Z
6
value 0.75341
scoring_system epss
scoring_elements 0.98876
published_at 2026-04-01T12:55:00Z
7
value 0.75341
scoring_system epss
scoring_elements 0.98878
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4975
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375968
reference_id 1375968
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375968
5
reference_url https://httpd.apache.org/security/json/CVE-2016-4975.json
reference_id CVE-2016-4975
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2016-4975.json
6
reference_url https://access.redhat.com/errata/RHSA-2017:0906
reference_id RHSA-2017:0906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0906
7
reference_url https://access.redhat.com/errata/RHSA-2018:2185
reference_id RHSA-2018:2185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2185
8
reference_url https://access.redhat.com/errata/RHSA-2018:2186
reference_id RHSA-2018:2186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2186
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2016-4975
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8gcm-7q3n-q7bm
40
url VCID-8nw9-zpxn-ckab
vulnerability_id VCID-8nw9-zpxn-ckab
summary
Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38476.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38476
reference_id
reference_type
scores
0
value 0.03452
scoring_system epss
scoring_elements 0.87515
published_at 2026-04-13T12:55:00Z
1
value 0.03452
scoring_system epss
scoring_elements 0.87486
published_at 2026-04-07T12:55:00Z
2
value 0.03452
scoring_system epss
scoring_elements 0.87505
published_at 2026-04-08T12:55:00Z
3
value 0.03452
scoring_system epss
scoring_elements 0.87512
published_at 2026-04-09T12:55:00Z
4
value 0.03452
scoring_system epss
scoring_elements 0.87523
published_at 2026-04-11T12:55:00Z
5
value 0.03452
scoring_system epss
scoring_elements 0.87519
published_at 2026-04-12T12:55:00Z
6
value 0.03545
scoring_system epss
scoring_elements 0.87649
published_at 2026-04-04T12:55:00Z
7
value 0.03545
scoring_system epss
scoring_elements 0.87636
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295015
reference_id 2295015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295015
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38476.json
reference_id CVE-2024-38476
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38476.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T03:55:12Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:5138
reference_id RHSA-2024:5138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5138
15
reference_url https://access.redhat.com/errata/RHSA-2024:5193
reference_id RHSA-2024:5193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5193
16
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
17
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
18
reference_url https://access.redhat.com/errata/RHSA-2024:5812
reference_id RHSA-2024:5812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5812
19
reference_url https://access.redhat.com/errata/RHSA-2024:5832
reference_id RHSA-2024:5832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5832
20
reference_url https://access.redhat.com/errata/RHSA-2024:6136
reference_id RHSA-2024:6136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6136
21
reference_url https://access.redhat.com/errata/RHSA-2024:6467
reference_id RHSA-2024:6467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6467
22
reference_url https://access.redhat.com/errata/RHSA-2024:6468
reference_id RHSA-2024:6468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6468
23
reference_url https://access.redhat.com/errata/RHSA-2024:6583
reference_id RHSA-2024:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6583
24
reference_url https://access.redhat.com/errata/RHSA-2024:6584
reference_id RHSA-2024:6584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6584
25
reference_url https://access.redhat.com/errata/RHSA-2024:7101
reference_id RHSA-2024:7101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7101
26
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
27
reference_url https://usn.ubuntu.com/6885-3/
reference_id USN-6885-3
reference_type
scores
url https://usn.ubuntu.com/6885-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-38476
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8nw9-zpxn-ckab
41
url VCID-9qdr-1v39-d7b7
vulnerability_id VCID-9qdr-1v39-d7b7
summary When mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. The severity is set to Moderate because "SessionEnv on" is not a default nor common configuration, it should be considered more severe when this is the case though, because of the possible remote exploitation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1283.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1283
reference_id
reference_type
scores
0
value 0.03348
scoring_system epss
scoring_elements 0.87263
published_at 2026-04-01T12:55:00Z
1
value 0.03348
scoring_system epss
scoring_elements 0.87316
published_at 2026-04-13T12:55:00Z
2
value 0.03348
scoring_system epss
scoring_elements 0.87313
published_at 2026-04-09T12:55:00Z
3
value 0.03348
scoring_system epss
scoring_elements 0.87326
published_at 2026-04-11T12:55:00Z
4
value 0.03348
scoring_system epss
scoring_elements 0.8732
published_at 2026-04-12T12:55:00Z
5
value 0.03348
scoring_system epss
scoring_elements 0.87273
published_at 2026-04-02T12:55:00Z
6
value 0.03348
scoring_system epss
scoring_elements 0.87289
published_at 2026-04-04T12:55:00Z
7
value 0.03348
scoring_system epss
scoring_elements 0.87287
published_at 2026-04-07T12:55:00Z
8
value 0.03348
scoring_system epss
scoring_elements 0.87306
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560395
reference_id 1560395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560395
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2018-1283.json
reference_id CVE-2018-1283
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1283.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-1283
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qdr-1v39-d7b7
42
url VCID-9tez-97xg-z3bs
vulnerability_id VCID-9tez-97xg-z3bs
summary
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.

Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49812.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49812
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32463
published_at 2026-04-04T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32427
published_at 2026-04-02T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32747
published_at 2026-04-13T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.3281
published_at 2026-04-09T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32811
published_at 2026-04-11T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32773
published_at 2026-04-12T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32735
published_at 2026-04-07T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32783
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374580
reference_id 2374580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374580
5
reference_url https://httpd.apache.org/security/json/CVE-2025-49812.json
reference_id CVE-2025-49812
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-49812.json
6
reference_url https://access.redhat.com/errata/RHSA-2025:13680
reference_id RHSA-2025:13680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13680
7
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
8
reference_url https://access.redhat.com/errata/RHSA-2025:14901
reference_id RHSA-2025:14901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14901
9
reference_url https://access.redhat.com/errata/RHSA-2025:14902
reference_id RHSA-2025:14902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14902
10
reference_url https://access.redhat.com/errata/RHSA-2025:14903
reference_id RHSA-2025:14903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14903
11
reference_url https://access.redhat.com/errata/RHSA-2025:14997
reference_id RHSA-2025:14997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14997
12
reference_url https://access.redhat.com/errata/RHSA-2025:14998
reference_id RHSA-2025:14998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14998
13
reference_url https://access.redhat.com/errata/RHSA-2025:15023
reference_id RHSA-2025:15023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15023
14
reference_url https://access.redhat.com/errata/RHSA-2025:15036
reference_id RHSA-2025:15036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15036
15
reference_url https://access.redhat.com/errata/RHSA-2025:15095
reference_id RHSA-2025:15095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15095
16
reference_url https://access.redhat.com/errata/RHSA-2025:15123
reference_id RHSA-2025:15123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15123
17
reference_url https://access.redhat.com/errata/RHSA-2025:15516
reference_id RHSA-2025:15516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15516
18
reference_url https://access.redhat.com/errata/RHSA-2025:15619
reference_id RHSA-2025:15619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15619
19
reference_url https://access.redhat.com/errata/RHSA-2025:15684
reference_id RHSA-2025:15684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15684
20
reference_url https://access.redhat.com/errata/RHSA-2025:15698
reference_id RHSA-2025:15698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15698
21
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
22
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-49812
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tez-97xg-z3bs
43
url VCID-9u53-b79b-cfgd
vulnerability_id VCID-9u53-b79b-cfgd
summary
Malformed requests may cause the server to dereference a NULL pointer.


This issue affects Apache HTTP Server 2.4.48 and earlier.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34798.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-34798
reference_id
reference_type
scores
0
value 0.1029
scoring_system epss
scoring_elements 0.93141
published_at 2026-04-01T12:55:00Z
1
value 0.1029
scoring_system epss
scoring_elements 0.93171
published_at 2026-04-13T12:55:00Z
2
value 0.1029
scoring_system epss
scoring_elements 0.93166
published_at 2026-04-09T12:55:00Z
3
value 0.1029
scoring_system epss
scoring_elements 0.93172
published_at 2026-04-11T12:55:00Z
4
value 0.1029
scoring_system epss
scoring_elements 0.93169
published_at 2026-04-12T12:55:00Z
5
value 0.1029
scoring_system epss
scoring_elements 0.93151
published_at 2026-04-02T12:55:00Z
6
value 0.1029
scoring_system epss
scoring_elements 0.93154
published_at 2026-04-04T12:55:00Z
7
value 0.1029
scoring_system epss
scoring_elements 0.93153
published_at 2026-04-07T12:55:00Z
8
value 0.1029
scoring_system epss
scoring_elements 0.93162
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-34798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2005128
reference_id 2005128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2005128
8
reference_url https://security.archlinux.org/AVG-2289
reference_id AVG-2289
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2289
9
reference_url https://httpd.apache.org/security/json/CVE-2021-34798.json
reference_id CVE-2021-34798
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-34798.json
10
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
11
reference_url https://access.redhat.com/errata/RHSA-2021:4613
reference_id RHSA-2021:4613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4613
12
reference_url https://access.redhat.com/errata/RHSA-2021:4614
reference_id RHSA-2021:4614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4614
13
reference_url https://access.redhat.com/errata/RHSA-2022:0143
reference_id RHSA-2022:0143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0143
14
reference_url https://access.redhat.com/errata/RHSA-2022:0891
reference_id RHSA-2022:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0891
15
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
16
reference_url https://usn.ubuntu.com/5090-1/
reference_id USN-5090-1
reference_type
scores
url https://usn.ubuntu.com/5090-1/
17
reference_url https://usn.ubuntu.com/5090-2/
reference_id USN-5090-2
reference_type
scores
url https://usn.ubuntu.com/5090-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-34798
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9u53-b79b-cfgd
44
url VCID-9vzm-qtye-ufh2
vulnerability_id VCID-9vzm-qtye-ufh2
summary By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. This issue only affects servers that have configured and enabled HTTP/2 support, which is not the default
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1333.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1333.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1333
reference_id
reference_type
scores
0
value 0.09859
scoring_system epss
scoring_elements 0.92958
published_at 2026-04-01T12:55:00Z
1
value 0.09859
scoring_system epss
scoring_elements 0.92987
published_at 2026-04-13T12:55:00Z
2
value 0.09859
scoring_system epss
scoring_elements 0.9297
published_at 2026-04-07T12:55:00Z
3
value 0.09859
scoring_system epss
scoring_elements 0.92978
published_at 2026-04-08T12:55:00Z
4
value 0.09859
scoring_system epss
scoring_elements 0.92983
published_at 2026-04-09T12:55:00Z
5
value 0.09859
scoring_system epss
scoring_elements 0.92988
published_at 2026-04-11T12:55:00Z
6
value 0.09859
scoring_system epss
scoring_elements 0.92986
published_at 2026-04-12T12:55:00Z
7
value 0.09859
scoring_system epss
scoring_elements 0.92967
published_at 2026-04-02T12:55:00Z
8
value 0.09859
scoring_system epss
scoring_elements 0.92971
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1333
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1333
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-1333
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-1333
6
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://security.netapp.com/advisory/ntap-20180926-0007/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0007/
19
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
20
reference_url https://www.tenable.com/security/tns-2019-09
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2019-09
21
reference_url http://www.securitytracker.com/id/1041402
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041402
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1605048
reference_id 1605048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1605048
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904106
reference_id 904106
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904106
24
reference_url https://security.archlinux.org/ASA-201807-12
reference_id ASA-201807-12
reference_type
scores
url https://security.archlinux.org/ASA-201807-12
25
reference_url https://security.archlinux.org/AVG-736
reference_id AVG-736
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-736
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
34
reference_url https://httpd.apache.org/security/json/CVE-2018-1333.json
reference_id CVE-2018-1333
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1333.json
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1333
reference_id CVE-2018-1333
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1333
36
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
37
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
38
reference_url https://usn.ubuntu.com/3783-1/
reference_id USN-3783-1
reference_type
scores
url https://usn.ubuntu.com/3783-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-1333
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9vzm-qtye-ufh2
45
url VCID-9ych-ybpr-j3h6
vulnerability_id VCID-9ych-ybpr-j3h6
summary Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13950.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13950
reference_id
reference_type
scores
0
value 0.21543
scoring_system epss
scoring_elements 0.95684
published_at 2026-04-01T12:55:00Z
1
value 0.21543
scoring_system epss
scoring_elements 0.95718
published_at 2026-04-13T12:55:00Z
2
value 0.21543
scoring_system epss
scoring_elements 0.95714
published_at 2026-04-09T12:55:00Z
3
value 0.21543
scoring_system epss
scoring_elements 0.95717
published_at 2026-04-11T12:55:00Z
4
value 0.21543
scoring_system epss
scoring_elements 0.95716
published_at 2026-04-12T12:55:00Z
5
value 0.21543
scoring_system epss
scoring_elements 0.95693
published_at 2026-04-02T12:55:00Z
6
value 0.21543
scoring_system epss
scoring_elements 0.95698
published_at 2026-04-04T12:55:00Z
7
value 0.21543
scoring_system epss
scoring_elements 0.95701
published_at 2026-04-07T12:55:00Z
8
value 0.21543
scoring_system epss
scoring_elements 0.9571
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1966738
reference_id 1966738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1966738
5
reference_url https://security.archlinux.org/AVG-2053
reference_id AVG-2053
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2053
6
reference_url https://httpd.apache.org/security/json/CVE-2020-13950.json
reference_id CVE-2020-13950
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2020-13950.json
7
reference_url https://security.gentoo.org/glsa/202107-38
reference_id GLSA-202107-38
reference_type
scores
url https://security.gentoo.org/glsa/202107-38
8
reference_url https://access.redhat.com/errata/RHSA-2021:4613
reference_id RHSA-2021:4613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4613
9
reference_url https://access.redhat.com/errata/RHSA-2021:4614
reference_id RHSA-2021:4614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4614
10
reference_url https://access.redhat.com/errata/RHSA-2022:5163
reference_id RHSA-2022:5163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5163
11
reference_url https://usn.ubuntu.com/4994-1/
reference_id USN-4994-1
reference_type
scores
url https://usn.ubuntu.com/4994-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2020-13950
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ych-ybpr-j3h6
46
url VCID-a9rw-3s1y-hqd7
vulnerability_id VCID-a9rw-3s1y-hqd7
summary Using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10082.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10082
reference_id
reference_type
scores
0
value 0.47892
scoring_system epss
scoring_elements 0.97695
published_at 2026-04-01T12:55:00Z
1
value 0.47892
scoring_system epss
scoring_elements 0.97717
published_at 2026-04-13T12:55:00Z
2
value 0.47892
scoring_system epss
scoring_elements 0.97707
published_at 2026-04-08T12:55:00Z
3
value 0.47892
scoring_system epss
scoring_elements 0.9771
published_at 2026-04-09T12:55:00Z
4
value 0.47892
scoring_system epss
scoring_elements 0.97713
published_at 2026-04-11T12:55:00Z
5
value 0.47892
scoring_system epss
scoring_elements 0.97716
published_at 2026-04-12T12:55:00Z
6
value 0.47892
scoring_system epss
scoring_elements 0.97701
published_at 2026-04-02T12:55:00Z
7
value 0.47892
scoring_system epss
scoring_elements 0.97703
published_at 2026-04-04T12:55:00Z
8
value 0.47892
scoring_system epss
scoring_elements 0.97702
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
9
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
20
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
21
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2022.html
22
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2021.html
23
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743974
reference_id 1743974
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743974
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
37
reference_url https://httpd.apache.org/security/json/CVE-2019-10082.json
reference_id CVE-2019-10082
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-10082.json
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10082
reference_id CVE-2019-10082
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10082
39
reference_url https://security.gentoo.org/glsa/201909-04
reference_id GLSA-201909-04
reference_type
scores
url https://security.gentoo.org/glsa/201909-04
40
reference_url https://access.redhat.com/errata/RHSA-2020:1336
reference_id RHSA-2020:1336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1336
41
reference_url https://access.redhat.com/errata/RHSA-2020:1337
reference_id RHSA-2020:1337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1337
42
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
43
reference_url https://usn.ubuntu.com/4113-1/
reference_id USN-4113-1
reference_type
scores
url https://usn.ubuntu.com/4113-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
2
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2019-10082
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9rw-3s1y-hqd7
47
url VCID-acx3-3v8f-1fhu
vulnerability_id VCID-acx3-3v8f-1fhu
summary The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1048
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16798
published_at 2026-04-13T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16776
published_at 2026-04-01T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16942
published_at 2026-04-02T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16999
published_at 2026-04-04T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16781
published_at 2026-04-07T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.1687
published_at 2026-04-08T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16927
published_at 2026-04-09T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16901
published_at 2026-04-11T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16856
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1048
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1048
2
reference_url http://security.debian.org/debian-security/pool/updates/main/a/apache2/apache2_2.2.16-6+squeeze11.diff.gz
reference_id
reference_type
scores
url http://security.debian.org/debian-security/pool/updates/main/a/apache2/apache2_2.2.16-6+squeeze11.diff.gz
3
reference_url http://www.debian.org/security/2013/dsa-2637
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2637
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:apache2:*:sid:*:*:*:*:*:*
reference_id cpe:2.3:a:debian:apache2:*:sid:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:apache2:*:sid:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:apache2:*:squeeze10:*:*:*:*:*:*
reference_id cpe:2.3:a:debian:apache2:*:squeeze10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:apache2:*:squeeze10:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:apache2:*:wheezy:*:*:*:*:*:*
reference_id cpe:2.3:a:debian:apache2:*:wheezy:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:apache2:*:wheezy:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1048
reference_id CVE-2013-1048
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1048
8
reference_url https://usn.ubuntu.com/1765-1/
reference_id USN-1765-1
reference_type
scores
url https://usn.ubuntu.com/1765-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2013-1048
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-acx3-3v8f-1fhu
48
url VCID-apfh-r85v-dbhz
vulnerability_id VCID-apfh-r85v-dbhz
summary When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.33 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerabilty hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1302.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1302
reference_id
reference_type
scores
0
value 0.12125
scoring_system epss
scoring_elements 0.93766
published_at 2026-04-01T12:55:00Z
1
value 0.12125
scoring_system epss
scoring_elements 0.93806
published_at 2026-04-13T12:55:00Z
2
value 0.12125
scoring_system epss
scoring_elements 0.93798
published_at 2026-04-08T12:55:00Z
3
value 0.12125
scoring_system epss
scoring_elements 0.93801
published_at 2026-04-09T12:55:00Z
4
value 0.12125
scoring_system epss
scoring_elements 0.93805
published_at 2026-04-11T12:55:00Z
5
value 0.12125
scoring_system epss
scoring_elements 0.93776
published_at 2026-04-02T12:55:00Z
6
value 0.12125
scoring_system epss
scoring_elements 0.93785
published_at 2026-04-04T12:55:00Z
7
value 0.12125
scoring_system epss
scoring_elements 0.93789
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1302
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1302
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560625
reference_id 1560625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560625
5
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
6
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
7
reference_url https://httpd.apache.org/security/json/CVE-2018-1302.json
reference_id CVE-2018-1302
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1302.json
8
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
9
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
10
reference_url https://usn.ubuntu.com/3783-1/
reference_id USN-3783-1
reference_type
scores
url https://usn.ubuntu.com/3783-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-1302
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apfh-r85v-dbhz
49
url VCID-auhk-ppv5-buaa
vulnerability_id VCID-auhk-ppv5-buaa
summary in Apache HTTP Server versions 2.4.0 to 2.4.41, mod_proxy_ftp use of uninitialized value with malicious FTP backend.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1934.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1934.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1934
reference_id
reference_type
scores
0
value 0.38657
scoring_system epss
scoring_elements 0.97221
published_at 2026-04-01T12:55:00Z
1
value 0.38657
scoring_system epss
scoring_elements 0.97248
published_at 2026-04-13T12:55:00Z
2
value 0.38657
scoring_system epss
scoring_elements 0.97233
published_at 2026-04-07T12:55:00Z
3
value 0.38657
scoring_system epss
scoring_elements 0.97242
published_at 2026-04-08T12:55:00Z
4
value 0.38657
scoring_system epss
scoring_elements 0.97243
published_at 2026-04-09T12:55:00Z
5
value 0.38657
scoring_system epss
scoring_elements 0.97247
published_at 2026-04-11T12:55:00Z
6
value 0.38657
scoring_system epss
scoring_elements 0.97227
published_at 2026-04-02T12:55:00Z
7
value 0.38657
scoring_system epss
scoring_elements 0.97232
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
8
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
9
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/
26
reference_url https://security.netapp.com/advisory/ntap-20200413-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200413-0002/
27
reference_url https://www.debian.org/security/2020/dsa-4757
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4757
28
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1820772
reference_id 1820772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1820772
30
reference_url https://security.archlinux.org/ASA-202004-14
reference_id ASA-202004-14
reference_type
scores
url https://security.archlinux.org/ASA-202004-14
31
reference_url https://security.archlinux.org/AVG-1126
reference_id AVG-1126
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1126
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
53
reference_url https://httpd.apache.org/security/json/CVE-2020-1934.json
reference_id CVE-2020-1934
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2020-1934.json
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1934
reference_id CVE-2020-1934
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-1934
55
reference_url https://access.redhat.com/errata/RHSA-2020:2644
reference_id RHSA-2020:2644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2644
56
reference_url https://access.redhat.com/errata/RHSA-2020:2646
reference_id RHSA-2020:2646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2646
57
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
58
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
59
reference_url https://usn.ubuntu.com/4458-1/
reference_id USN-4458-1
reference_type
scores
url https://usn.ubuntu.com/4458-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2020-1934
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-auhk-ppv5-buaa
50
url VCID-b68y-4prb-bfdk
vulnerability_id VCID-b68y-4prb-bfdk
summary Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31122.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-31122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31122
reference_id
reference_type
scores
0
value 0.0043
scoring_system epss
scoring_elements 0.6251
published_at 2026-04-02T12:55:00Z
1
value 0.0043
scoring_system epss
scoring_elements 0.62559
published_at 2026-04-13T12:55:00Z
2
value 0.0043
scoring_system epss
scoring_elements 0.62543
published_at 2026-04-04T12:55:00Z
3
value 0.0043
scoring_system epss
scoring_elements 0.62508
published_at 2026-04-07T12:55:00Z
4
value 0.0043
scoring_system epss
scoring_elements 0.6256
published_at 2026-04-08T12:55:00Z
5
value 0.0043
scoring_system epss
scoring_elements 0.62575
published_at 2026-04-09T12:55:00Z
6
value 0.0043
scoring_system epss
scoring_elements 0.62593
published_at 2026-04-11T12:55:00Z
7
value 0.0043
scoring_system epss
scoring_elements 0.62582
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245332
reference_id 2245332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245332
10
reference_url https://httpd.apache.org/security/json/CVE-2023-31122.json
reference_id CVE-2023-31122
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2023-31122.json
11
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T20:23:50Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html
12
reference_url https://security.netapp.com/advisory/ntap-20231027-0011/
reference_id ntap-20231027-0011
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T20:23:50Z/
url https://security.netapp.com/advisory/ntap-20231027-0011/
13
reference_url https://access.redhat.com/errata/RHSA-2024:1316
reference_id RHSA-2024:1316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1316
14
reference_url https://access.redhat.com/errata/RHSA-2024:1317
reference_id RHSA-2024:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1317
15
reference_url https://access.redhat.com/errata/RHSA-2024:2278
reference_id RHSA-2024:2278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2278
16
reference_url https://access.redhat.com/errata/RHSA-2024:3121
reference_id RHSA-2024:3121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3121
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/
reference_id TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T20:23:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/
18
reference_url https://usn.ubuntu.com/6506-1/
reference_id USN-6506-1
reference_type
scores
url https://usn.ubuntu.com/6506-1/
19
reference_url https://usn.ubuntu.com/6510-1/
reference_id USN-6510-1
reference_type
scores
url https://usn.ubuntu.com/6510-1/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/
reference_id VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T20:23:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/
reference_id ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T20:23:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2023-31122
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b68y-4prb-bfdk
51
url VCID-b9ks-detx-nkdw
vulnerability_id VCID-b9ks-detx-nkdw
summary
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via 
mod_rewrite or apache expressions that pass unvalidated request input.

This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.

Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. 

The server offers limited protection against administrators directing the server to open UNC paths.
Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43394.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-43394
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.1559
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15658
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.1603
published_at 2026-04-13T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.1616
published_at 2026-04-09T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16137
published_at 2026-04-11T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16098
published_at 2026-04-12T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.1601
published_at 2026-04-07T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16096
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-43394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43394
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379332
reference_id 2379332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379332
5
reference_url https://httpd.apache.org/security/json/CVE-2024-43394.json
reference_id CVE-2024-43394
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-43394.json
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2024-43394
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9ks-detx-nkdw
52
url VCID-bau7-pme5-ckbt
vulnerability_id VCID-bau7-pme5-ckbt
summary
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.

Users are recommended to upgrade to version 2.4.59, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24795.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24795.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24795
reference_id
reference_type
scores
0
value 0.01123
scoring_system epss
scoring_elements 0.78267
published_at 2026-04-13T12:55:00Z
1
value 0.01123
scoring_system epss
scoring_elements 0.78264
published_at 2026-04-09T12:55:00Z
2
value 0.01123
scoring_system epss
scoring_elements 0.78289
published_at 2026-04-11T12:55:00Z
3
value 0.01123
scoring_system epss
scoring_elements 0.78271
published_at 2026-04-12T12:55:00Z
4
value 0.01123
scoring_system epss
scoring_elements 0.78219
published_at 2026-04-02T12:55:00Z
5
value 0.01123
scoring_system epss
scoring_elements 0.78249
published_at 2026-04-04T12:55:00Z
6
value 0.01123
scoring_system epss
scoring_elements 0.78231
published_at 2026-04-07T12:55:00Z
7
value 0.01123
scoring_system epss
scoring_elements 0.78258
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24795
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068412
reference_id 1068412
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068412
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2273499
reference_id 2273499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2273499
11
reference_url https://httpd.apache.org/security/json/CVE-2024-24795.json
reference_id CVE-2024-24795
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-24795.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://access.redhat.com/errata/RHSA-2024:9306
reference_id RHSA-2024:9306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9306
14
reference_url https://access.redhat.com/errata/RHSA-2025:3452
reference_id RHSA-2025:3452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3452
15
reference_url https://access.redhat.com/errata/RHSA-2025:3453
reference_id RHSA-2025:3453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3453
16
reference_url https://usn.ubuntu.com/6729-1/
reference_id USN-6729-1
reference_type
scores
url https://usn.ubuntu.com/6729-1/
17
reference_url https://usn.ubuntu.com/6729-2/
reference_id USN-6729-2
reference_type
scores
url https://usn.ubuntu.com/6729-2/
18
reference_url https://usn.ubuntu.com/6729-3/
reference_id USN-6729-3
reference_type
scores
url https://usn.ubuntu.com/6729-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-24795
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bau7-pme5-ckbt
53
url VCID-bvkg-nrwd-e7g8
vulnerability_id VCID-bvkg-nrwd-e7g8
summary Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26690.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26690.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-26690
reference_id
reference_type
scores
0
value 0.70379
scoring_system epss
scoring_elements 0.98675
published_at 2026-04-02T12:55:00Z
1
value 0.70379
scoring_system epss
scoring_elements 0.98687
published_at 2026-04-13T12:55:00Z
2
value 0.70379
scoring_system epss
scoring_elements 0.98682
published_at 2026-04-08T12:55:00Z
3
value 0.70379
scoring_system epss
scoring_elements 0.98683
published_at 2026-04-09T12:55:00Z
4
value 0.70379
scoring_system epss
scoring_elements 0.98685
published_at 2026-04-12T12:55:00Z
5
value 0.70379
scoring_system epss
scoring_elements 0.98678
published_at 2026-04-04T12:55:00Z
6
value 0.70379
scoring_system epss
scoring_elements 0.98681
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-26690
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1966729
reference_id 1966729
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1966729
9
reference_url https://security.archlinux.org/AVG-2053
reference_id AVG-2053
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2053
10
reference_url https://httpd.apache.org/security/json/CVE-2021-26690.json
reference_id CVE-2021-26690
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-26690.json
11
reference_url https://security.gentoo.org/glsa/202107-38
reference_id GLSA-202107-38
reference_type
scores
url https://security.gentoo.org/glsa/202107-38
12
reference_url https://access.redhat.com/errata/RHSA-2021:4257
reference_id RHSA-2021:4257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4257
13
reference_url https://access.redhat.com/errata/RHSA-2021:4613
reference_id RHSA-2021:4613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4613
14
reference_url https://access.redhat.com/errata/RHSA-2021:4614
reference_id RHSA-2021:4614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4614
15
reference_url https://usn.ubuntu.com/4994-1/
reference_id USN-4994-1
reference_type
scores
url https://usn.ubuntu.com/4994-1/
16
reference_url https://usn.ubuntu.com/4994-2/
reference_id USN-4994-2
reference_type
scores
url https://usn.ubuntu.com/4994-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-26690
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bvkg-nrwd-e7g8
54
url VCID-cqjv-6m9n-mfeq
vulnerability_id VCID-cqjv-6m9n-mfeq
summary
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery).

This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44224.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44224.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44224
reference_id
reference_type
scores
0
value 0.1096
scoring_system epss
scoring_elements 0.93382
published_at 2026-04-01T12:55:00Z
1
value 0.1096
scoring_system epss
scoring_elements 0.93414
published_at 2026-04-12T12:55:00Z
2
value 0.1096
scoring_system epss
scoring_elements 0.93409
published_at 2026-04-09T12:55:00Z
3
value 0.1096
scoring_system epss
scoring_elements 0.93415
published_at 2026-04-13T12:55:00Z
4
value 0.1096
scoring_system epss
scoring_elements 0.9339
published_at 2026-04-02T12:55:00Z
5
value 0.1096
scoring_system epss
scoring_elements 0.93398
published_at 2026-04-07T12:55:00Z
6
value 0.1096
scoring_system epss
scoring_elements 0.93406
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44224
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034672
reference_id 2034672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034672
6
reference_url https://httpd.apache.org/security/json/CVE-2021-44224.json
reference_id CVE-2021-44224
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-44224.json
7
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
8
reference_url https://access.redhat.com/errata/RHSA-2022:1915
reference_id RHSA-2022:1915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1915
9
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
10
reference_url https://access.redhat.com/errata/RHSA-2022:7143
reference_id RHSA-2022:7143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7143
11
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
12
reference_url https://usn.ubuntu.com/5212-1/
reference_id USN-5212-1
reference_type
scores
url https://usn.ubuntu.com/5212-1/
13
reference_url https://usn.ubuntu.com/5212-2/
reference_id USN-5212-2
reference_type
scores
url https://usn.ubuntu.com/5212-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-44224
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cqjv-6m9n-mfeq
55
url VCID-ct26-19cq-8kd7
vulnerability_id VCID-ct26-19cq-8kd7
summary In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17199.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-17199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-17199
reference_id
reference_type
scores
0
value 0.10459
scoring_system epss
scoring_elements 0.93208
published_at 2026-04-01T12:55:00Z
1
value 0.10459
scoring_system epss
scoring_elements 0.93236
published_at 2026-04-13T12:55:00Z
2
value 0.10459
scoring_system epss
scoring_elements 0.9322
published_at 2026-04-07T12:55:00Z
3
value 0.10459
scoring_system epss
scoring_elements 0.93228
published_at 2026-04-08T12:55:00Z
4
value 0.10459
scoring_system epss
scoring_elements 0.93233
published_at 2026-04-09T12:55:00Z
5
value 0.10459
scoring_system epss
scoring_elements 0.93237
published_at 2026-04-11T12:55:00Z
6
value 0.10459
scoring_system epss
scoring_elements 0.93234
published_at 2026-04-12T12:55:00Z
7
value 0.10459
scoring_system epss
scoring_elements 0.93217
published_at 2026-04-02T12:55:00Z
8
value 0.10459
scoring_system epss
scoring_elements 0.93222
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-17199
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
10
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html
23
reference_url https://seclists.org/bugtraq/2019/Apr/5
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/5
24
reference_url https://security.gentoo.org/glsa/201903-21
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201903-21
25
reference_url https://security.netapp.com/advisory/ntap-20190125-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190125-0001/
26
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
27
reference_url https://www.debian.org/security/2019/dsa-4422
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4422
28
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
29
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
30
reference_url https://www.tenable.com/security/tns-2019-09
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2019-09
31
reference_url http://www.securityfocus.com/bid/106742
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106742
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1668493
reference_id 1668493
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1668493
33
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920303
reference_id 920303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920303
34
reference_url https://security.archlinux.org/ASA-201901-14
reference_id ASA-201901-14
reference_type
scores
url https://security.archlinux.org/ASA-201901-14
35
reference_url https://security.archlinux.org/AVG-857
reference_id AVG-857
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-857
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
46
reference_url https://httpd.apache.org/security/json/CVE-2018-17199.json
reference_id CVE-2018-17199
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-17199.json
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-17199
reference_id CVE-2018-17199
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-17199
48
reference_url https://access.redhat.com/errata/RHSA-2019:3932
reference_id RHSA-2019:3932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3932
49
reference_url https://access.redhat.com/errata/RHSA-2019:3933
reference_id RHSA-2019:3933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3933
50
reference_url https://access.redhat.com/errata/RHSA-2019:3935
reference_id RHSA-2019:3935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3935
51
reference_url https://access.redhat.com/errata/RHSA-2019:4126
reference_id RHSA-2019:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4126
52
reference_url https://access.redhat.com/errata/RHSA-2020:1121
reference_id RHSA-2020:1121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1121
53
reference_url https://access.redhat.com/errata/RHSA-2021:1809
reference_id RHSA-2021:1809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1809
54
reference_url https://usn.ubuntu.com/3937-1/
reference_id USN-3937-1
reference_type
scores
url https://usn.ubuntu.com/3937-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-17199
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ct26-19cq-8kd7
56
url VCID-d36c-rrxh-ybgv
vulnerability_id VCID-d36c-rrxh-ybgv
summary In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29404.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29404
reference_id
reference_type
scores
0
value 0.0232
scoring_system epss
scoring_elements 0.84797
published_at 2026-04-13T12:55:00Z
1
value 0.0232
scoring_system epss
scoring_elements 0.84788
published_at 2026-04-09T12:55:00Z
2
value 0.0232
scoring_system epss
scoring_elements 0.84806
published_at 2026-04-11T12:55:00Z
3
value 0.0232
scoring_system epss
scoring_elements 0.84802
published_at 2026-04-12T12:55:00Z
4
value 0.0232
scoring_system epss
scoring_elements 0.84738
published_at 2026-04-02T12:55:00Z
5
value 0.0232
scoring_system epss
scoring_elements 0.84757
published_at 2026-04-04T12:55:00Z
6
value 0.0232
scoring_system epss
scoring_elements 0.84759
published_at 2026-04-07T12:55:00Z
7
value 0.0232
scoring_system epss
scoring_elements 0.84781
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
reference_id 1012513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2095012
reference_id 2095012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2095012
6
reference_url https://security.archlinux.org/AVG-2763
reference_id AVG-2763
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2763
7
reference_url https://httpd.apache.org/security/json/CVE-2022-29404.json
reference_id CVE-2022-29404
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-29404.json
8
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
9
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
10
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
11
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
12
reference_url https://usn.ubuntu.com/5487-1/
reference_id USN-5487-1
reference_type
scores
url https://usn.ubuntu.com/5487-1/
13
reference_url https://usn.ubuntu.com/5487-3/
reference_id USN-5487-3
reference_type
scores
url https://usn.ubuntu.com/5487-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-29404
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d36c-rrxh-ybgv
57
url VCID-d4rc-pnv5-6uc8
vulnerability_id VCID-d4rc-pnv5-6uc8
summary A flaw was found in the default error response for status code 400. This flaw could be used by an attacker to expose "httpOnly" cookies when no custom ErrorDocument is specified.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0053.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0053
reference_id
reference_type
scores
0
value 0.55955
scoring_system epss
scoring_elements 0.98088
published_at 2026-04-07T12:55:00Z
1
value 0.55955
scoring_system epss
scoring_elements 0.98081
published_at 2026-04-01T12:55:00Z
2
value 0.55955
scoring_system epss
scoring_elements 0.98084
published_at 2026-04-02T12:55:00Z
3
value 0.55955
scoring_system epss
scoring_elements 0.981
published_at 2026-04-13T12:55:00Z
4
value 0.55955
scoring_system epss
scoring_elements 0.98093
published_at 2026-04-09T12:55:00Z
5
value 0.55955
scoring_system epss
scoring_elements 0.98099
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785069
reference_id 785069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785069
4
reference_url https://httpd.apache.org/security/json/CVE-2012-0053.json
reference_id CVE-2012-0053
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0053.json
5
reference_url https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08
reference_id CVE-2012-0053;OSVDB-78556
reference_type exploit
scores
url https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/18442.html
reference_id CVE-2012-0053;OSVDB-78556
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/18442.html
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
10
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
11
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
12
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-0053
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4rc-pnv5-6uc8
58
url VCID-db6k-j9mj-e7hy
vulnerability_id VCID-db6k-j9mj-e7hy
summary
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning.

This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33193.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33193
reference_id
reference_type
scores
0
value 0.00739
scoring_system epss
scoring_elements 0.72839
published_at 2026-04-01T12:55:00Z
1
value 0.00739
scoring_system epss
scoring_elements 0.729
published_at 2026-04-12T12:55:00Z
2
value 0.00739
scoring_system epss
scoring_elements 0.72879
published_at 2026-04-08T12:55:00Z
3
value 0.00739
scoring_system epss
scoring_elements 0.72892
published_at 2026-04-13T12:55:00Z
4
value 0.00739
scoring_system epss
scoring_elements 0.72917
published_at 2026-04-11T12:55:00Z
5
value 0.00739
scoring_system epss
scoring_elements 0.72846
published_at 2026-04-02T12:55:00Z
6
value 0.00739
scoring_system epss
scoring_elements 0.72866
published_at 2026-04-04T12:55:00Z
7
value 0.00739
scoring_system epss
scoring_elements 0.72841
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33193
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1966728
reference_id 1966728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1966728
5
reference_url https://security.archlinux.org/AVG-2289
reference_id AVG-2289
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2289
6
reference_url https://httpd.apache.org/security/json/CVE-2021-33193.json
reference_id CVE-2021-33193
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-33193.json
7
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
8
reference_url https://access.redhat.com/errata/RHSA-2022:1915
reference_id RHSA-2022:1915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1915
9
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
10
reference_url https://access.redhat.com/errata/RHSA-2022:7143
reference_id RHSA-2022:7143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7143
11
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
12
reference_url https://usn.ubuntu.com/5090-1/
reference_id USN-5090-1
reference_type
scores
url https://usn.ubuntu.com/5090-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-33193
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-db6k-j9mj-e7hy
59
url VCID-e3jc-83a7-8uhh
vulnerability_id VCID-e3jc-83a7-8uhh
summary By sending continous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11763.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11763.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11763
reference_id
reference_type
scores
0
value 0.17401
scoring_system epss
scoring_elements 0.95033
published_at 2026-04-01T12:55:00Z
1
value 0.17401
scoring_system epss
scoring_elements 0.95068
published_at 2026-04-13T12:55:00Z
2
value 0.17401
scoring_system epss
scoring_elements 0.95064
published_at 2026-04-11T12:55:00Z
3
value 0.17401
scoring_system epss
scoring_elements 0.95065
published_at 2026-04-12T12:55:00Z
4
value 0.17401
scoring_system epss
scoring_elements 0.95044
published_at 2026-04-02T12:55:00Z
5
value 0.17401
scoring_system epss
scoring_elements 0.95045
published_at 2026-04-04T12:55:00Z
6
value 0.17401
scoring_system epss
scoring_elements 0.95047
published_at 2026-04-07T12:55:00Z
7
value 0.17401
scoring_system epss
scoring_elements 0.95055
published_at 2026-04-08T12:55:00Z
8
value 0.17401
scoring_system epss
scoring_elements 0.95058
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11763
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11763
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1633399
reference_id 1633399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1633399
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909591
reference_id 909591
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909591
6
reference_url https://httpd.apache.org/security/json/CVE-2018-11763.json
reference_id CVE-2018-11763
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-11763.json
7
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
8
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
9
reference_url https://usn.ubuntu.com/3783-1/
reference_id USN-3783-1
reference_type
scores
url https://usn.ubuntu.com/3783-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-11763
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e3jc-83a7-8uhh
60
url VCID-edvy-cern-6kcu
vulnerability_id VCID-edvy-cern-6kcu
summary
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.




Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
 or ProxyPassMatch in which a non-specific pattern matches
 some portion of the user-supplied request-target (URL) data and is then
 re-inserted into the proxied request-target using variable 
substitution. For example, something like:




RewriteEngine on
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ http://example.com:8080/


Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25690.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25690.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25690
reference_id
reference_type
scores
0
value 0.68183
scoring_system epss
scoring_elements 0.98587
published_at 2026-04-02T12:55:00Z
1
value 0.68183
scoring_system epss
scoring_elements 0.98591
published_at 2026-04-04T12:55:00Z
2
value 0.68183
scoring_system epss
scoring_elements 0.98592
published_at 2026-04-07T12:55:00Z
3
value 0.68183
scoring_system epss
scoring_elements 0.98595
published_at 2026-04-08T12:55:00Z
4
value 0.68183
scoring_system epss
scoring_elements 0.98596
published_at 2026-04-09T12:55:00Z
5
value 0.68183
scoring_system epss
scoring_elements 0.98598
published_at 2026-04-11T12:55:00Z
6
value 0.68183
scoring_system epss
scoring_elements 0.98599
published_at 2026-04-12T12:55:00Z
7
value 0.68183
scoring_system epss
scoring_elements 0.986
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25690
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
reference_id 1032476
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032476
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2176209
reference_id 2176209
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2176209
10
reference_url http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
reference_id Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-18T15:37:02Z/
url http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
11
reference_url https://httpd.apache.org/security/json/CVE-2023-25690.json
reference_id CVE-2023-25690
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2023-25690.json
12
reference_url https://access.redhat.com/errata/RHSA-2023:1547
reference_id RHSA-2023:1547
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1547
13
reference_url https://access.redhat.com/errata/RHSA-2023:1593
reference_id RHSA-2023:1593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1593
14
reference_url https://access.redhat.com/errata/RHSA-2023:1596
reference_id RHSA-2023:1596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1596
15
reference_url https://access.redhat.com/errata/RHSA-2023:1597
reference_id RHSA-2023:1597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1597
16
reference_url https://access.redhat.com/errata/RHSA-2023:1670
reference_id RHSA-2023:1670
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1670
17
reference_url https://access.redhat.com/errata/RHSA-2023:1672
reference_id RHSA-2023:1672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1672
18
reference_url https://access.redhat.com/errata/RHSA-2023:1673
reference_id RHSA-2023:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1673
19
reference_url https://access.redhat.com/errata/RHSA-2023:1916
reference_id RHSA-2023:1916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1916
20
reference_url https://access.redhat.com/errata/RHSA-2023:3292
reference_id RHSA-2023:3292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3292
21
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
22
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
23
reference_url https://usn.ubuntu.com/5942-1/
reference_id USN-5942-1
reference_type
scores
url https://usn.ubuntu.com/5942-1/
24
reference_url https://usn.ubuntu.com/5942-2/
reference_id USN-5942-2
reference_type
scores
url https://usn.ubuntu.com/5942-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2023-25690
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edvy-cern-6kcu
61
url VCID-eesz-v6ae-gya3
vulnerability_id VCID-eesz-v6ae-gya3
summary In Apache HTTP Server versions 2.4.20 to 2.4.43, a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9490.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9490
reference_id
reference_type
scores
0
value 0.76276
scoring_system epss
scoring_elements 0.98919
published_at 2026-04-01T12:55:00Z
1
value 0.76276
scoring_system epss
scoring_elements 0.98929
published_at 2026-04-13T12:55:00Z
2
value 0.76276
scoring_system epss
scoring_elements 0.98926
published_at 2026-04-09T12:55:00Z
3
value 0.76276
scoring_system epss
scoring_elements 0.98928
published_at 2026-04-11T12:55:00Z
4
value 0.76276
scoring_system epss
scoring_elements 0.9892
published_at 2026-04-02T12:55:00Z
5
value 0.76276
scoring_system epss
scoring_elements 0.98922
published_at 2026-04-04T12:55:00Z
6
value 0.76276
scoring_system epss
scoring_elements 0.98925
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1866560
reference_id 1866560
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1866560
9
reference_url https://httpd.apache.org/security/json/CVE-2020-9490.json
reference_id CVE-2020-9490
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2020-9490.json
10
reference_url https://security.gentoo.org/glsa/202008-04
reference_id GLSA-202008-04
reference_type
scores
url https://security.gentoo.org/glsa/202008-04
11
reference_url https://access.redhat.com/errata/RHSA-2020:3714
reference_id RHSA-2020:3714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3714
12
reference_url https://access.redhat.com/errata/RHSA-2020:3726
reference_id RHSA-2020:3726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3726
13
reference_url https://access.redhat.com/errata/RHSA-2020:3733
reference_id RHSA-2020:3733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3733
14
reference_url https://access.redhat.com/errata/RHSA-2020:3734
reference_id RHSA-2020:3734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3734
15
reference_url https://usn.ubuntu.com/4458-1/
reference_id USN-4458-1
reference_type
scores
url https://usn.ubuntu.com/4458-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2020-9490
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eesz-v6ae-gya3
62
url VCID-ehv1-yvpu-ubcg
vulnerability_id VCID-ehv1-yvpu-ubcg
summary In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
3
reference_url http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://packetstormsecurity.com/files/152386/Apache-2.4.38-Root-Privilege-Escalation.html
4
reference_url http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://packetstormsecurity.com/files/152415/Slackware-Security-Advisory-httpd-Updates.html
5
reference_url http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://packetstormsecurity.com/files/152441/CARPE-DIEM-Apache-2.4.x-Local-Privilege-Escalation.html
6
reference_url https://access.redhat.com/errata/RHBA-2019:0959
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://access.redhat.com/errata/RHBA-2019:0959
7
reference_url https://access.redhat.com/errata/RHSA-2019:1543
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://access.redhat.com/errata/RHSA-2019:1543
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0211.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0211.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0211
reference_id
reference_type
scores
0
value 0.90159
scoring_system epss
scoring_elements 0.99586
published_at 2026-04-01T12:55:00Z
1
value 0.9026
scoring_system epss
scoring_elements 0.99594
published_at 2026-04-04T12:55:00Z
2
value 0.9026
scoring_system epss
scoring_elements 0.99593
published_at 2026-04-02T12:55:00Z
3
value 0.90908
scoring_system epss
scoring_elements 0.99632
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0211
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://httpd.apache.org/security/vulnerabilities_24.html
18
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/890507b85c30adf133216b299cc35cd8cd0346a885acfc671c04694e%40%3Cdev.community.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/b1613d44ec364c87bb7ee8c5939949f9b061c05c06e0e90098ebf7aa%40%3Cusers.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/b2bdb308dc015e771ba79c0586b2de6fb50caa98b109833f5d4daf28%40%3Cdev.community.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/de881a130bc9cb2f3a9ff220784520556884fb8ea80e69400a45509e%40%3Cdev.community.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/fd110f4ace2d8364c7d9190e1993cde92f79e4eb85576ed9285686ac%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
39
reference_url https://seclists.org/bugtraq/2019/Apr/16
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://seclists.org/bugtraq/2019/Apr/16
40
reference_url https://seclists.org/bugtraq/2019/Apr/5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://seclists.org/bugtraq/2019/Apr/5
41
reference_url https://security.netapp.com/advisory/ntap-20190423-0001/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://security.netapp.com/advisory/ntap-20190423-0001/
42
reference_url https://support.f5.com/csp/article/K32957101
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://support.f5.com/csp/article/K32957101
43
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
44
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-0211
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-0211
45
reference_url https://www.debian.org/security/2019/dsa-4422
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://www.debian.org/security/2019/dsa-4422
46
reference_url https://www.exploit-db.com/exploits/46676/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://www.exploit-db.com/exploits/46676/
47
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
48
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
49
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
50
reference_url https://www.synology.com/security/advisory/Synology_SA_19_14
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://www.synology.com/security/advisory/Synology_SA_19_14
51
reference_url http://www.apache.org/dist/httpd/CHANGES_2.4.39
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://www.apache.org/dist/httpd/CHANGES_2.4.39
52
reference_url http://www.openwall.com/lists/oss-security/2019/04/02/3
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://www.openwall.com/lists/oss-security/2019/04/02/3
53
reference_url http://www.openwall.com/lists/oss-security/2019/07/26/7
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://www.openwall.com/lists/oss-security/2019/07/26/7
54
reference_url http://www.securityfocus.com/bid/107666
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url http://www.securityfocus.com/bid/107666
55
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1694980
reference_id 1694980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1694980
56
reference_url https://security.archlinux.org/ASA-201904-3
reference_id ASA-201904-3
reference_type
scores
url https://security.archlinux.org/ASA-201904-3
57
reference_url https://security.archlinux.org/AVG-946
reference_id AVG-946
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-946
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform_for_power:3.11_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform_for_power:3.11_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform_for_power:3.11_ppc64le:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.2_aarch64:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.4_aarch64:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.6_aarch64:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2_s390x:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4_s390x:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2_ppc64le:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.8:*:*:*:*:*:*:*
126
reference_url https://github.com/cfreal/exploits/blob/ba026fae59974037d744a90cef09224f751bc3e4/CVE-2019-0211-apache/cfreal-carpediem.php
reference_id CVE-2019-0211
reference_type exploit
scores
url https://github.com/cfreal/exploits/blob/ba026fae59974037d744a90cef09224f751bc3e4/CVE-2019-0211-apache/cfreal-carpediem.php
127
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46676.php
reference_id CVE-2019-0211
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/46676.php
128
reference_url https://httpd.apache.org/security/json/CVE-2019-0211.json
reference_id CVE-2019-0211
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-0211.json
129
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-0211
reference_id CVE-2019-0211
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-0211
130
reference_url https://security.gentoo.org/glsa/201904-20
reference_id GLSA-201904-20
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://security.gentoo.org/glsa/201904-20
131
reference_url https://access.redhat.com/errata/RHSA-2019:0746
reference_id RHSA-2019:0746
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://access.redhat.com/errata/RHSA-2019:0746
132
reference_url https://access.redhat.com/errata/RHSA-2019:0980
reference_id RHSA-2019:0980
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://access.redhat.com/errata/RHSA-2019:0980
133
reference_url https://access.redhat.com/errata/RHSA-2019:1296
reference_id RHSA-2019:1296
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://access.redhat.com/errata/RHSA-2019:1296
134
reference_url https://access.redhat.com/errata/RHSA-2019:1297
reference_id RHSA-2019:1297
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://access.redhat.com/errata/RHSA-2019:1297
135
reference_url https://usn.ubuntu.com/3937-1/
reference_id USN-3937-1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:03:33Z/
url https://usn.ubuntu.com/3937-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2019-0211
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ehv1-yvpu-ubcg
63
url VCID-ej7y-7na3-5qby
vulnerability_id VCID-ej7y-7na3-5qby
summary
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in
directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38474.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38474.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38474
reference_id
reference_type
scores
0
value 0.00744
scoring_system epss
scoring_elements 0.73027
published_at 2026-04-13T12:55:00Z
1
value 0.00744
scoring_system epss
scoring_elements 0.72979
published_at 2026-04-07T12:55:00Z
2
value 0.00744
scoring_system epss
scoring_elements 0.73016
published_at 2026-04-08T12:55:00Z
3
value 0.00744
scoring_system epss
scoring_elements 0.7303
published_at 2026-04-09T12:55:00Z
4
value 0.00744
scoring_system epss
scoring_elements 0.73055
published_at 2026-04-11T12:55:00Z
5
value 0.00744
scoring_system epss
scoring_elements 0.73034
published_at 2026-04-12T12:55:00Z
6
value 0.00744
scoring_system epss
scoring_elements 0.72983
published_at 2026-04-02T12:55:00Z
7
value 0.00744
scoring_system epss
scoring_elements 0.73003
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38474
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295013
reference_id 2295013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295013
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38474.json
reference_id CVE-2024-38474
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38474.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T18:02:41Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:4719
reference_id RHSA-2024:4719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4719
15
reference_url https://access.redhat.com/errata/RHSA-2024:4720
reference_id RHSA-2024:4720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4720
16
reference_url https://access.redhat.com/errata/RHSA-2024:4726
reference_id RHSA-2024:4726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4726
17
reference_url https://access.redhat.com/errata/RHSA-2024:4820
reference_id RHSA-2024:4820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4820
18
reference_url https://access.redhat.com/errata/RHSA-2024:4827
reference_id RHSA-2024:4827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4827
19
reference_url https://access.redhat.com/errata/RHSA-2024:4830
reference_id RHSA-2024:4830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4830
20
reference_url https://access.redhat.com/errata/RHSA-2024:4862
reference_id RHSA-2024:4862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4862
21
reference_url https://access.redhat.com/errata/RHSA-2024:4863
reference_id RHSA-2024:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4863
22
reference_url https://access.redhat.com/errata/RHSA-2024:4938
reference_id RHSA-2024:4938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4938
23
reference_url https://access.redhat.com/errata/RHSA-2024:4943
reference_id RHSA-2024:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4943
24
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
25
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
26
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
27
reference_url https://usn.ubuntu.com/6885-3/
reference_id USN-6885-3
reference_type
scores
url https://usn.ubuntu.com/6885-3/
28
reference_url https://usn.ubuntu.com/6885-5/
reference_id USN-6885-5
reference_type
scores
url https://usn.ubuntu.com/6885-5/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-38474
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej7y-7na3-5qby
64
url VCID-f2y3-s6j8-7ygr
vulnerability_id VCID-f2y3-s6j8-7ygr
summary Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17567.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17567
reference_id
reference_type
scores
0
value 0.12438
scoring_system epss
scoring_elements 0.93865
published_at 2026-04-01T12:55:00Z
1
value 0.12438
scoring_system epss
scoring_elements 0.93903
published_at 2026-04-12T12:55:00Z
2
value 0.12438
scoring_system epss
scoring_elements 0.93895
published_at 2026-04-08T12:55:00Z
3
value 0.12438
scoring_system epss
scoring_elements 0.93898
published_at 2026-04-09T12:55:00Z
4
value 0.12438
scoring_system epss
scoring_elements 0.93902
published_at 2026-04-13T12:55:00Z
5
value 0.12438
scoring_system epss
scoring_elements 0.93874
published_at 2026-04-02T12:55:00Z
6
value 0.12438
scoring_system epss
scoring_elements 0.93883
published_at 2026-04-04T12:55:00Z
7
value 0.12438
scoring_system epss
scoring_elements 0.93886
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1966740
reference_id 1966740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1966740
5
reference_url https://security.archlinux.org/AVG-2053
reference_id AVG-2053
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2053
6
reference_url https://httpd.apache.org/security/json/CVE-2019-17567.json
reference_id CVE-2019-17567
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-17567.json
7
reference_url https://security.gentoo.org/glsa/202107-38
reference_id GLSA-202107-38
reference_type
scores
url https://security.gentoo.org/glsa/202107-38
8
reference_url https://access.redhat.com/errata/RHSA-2021:4613
reference_id RHSA-2021:4613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4613
9
reference_url https://access.redhat.com/errata/RHSA-2021:4614
reference_id RHSA-2021:4614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4614
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2019-17567
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f2y3-s6j8-7ygr
65
url VCID-fnxp-n271-mfd8
vulnerability_id VCID-fnxp-n271-mfd8
summary A NULL pointer deference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. This crash would only be a denial of service if using a threaded MPM.
references
0
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
1
reference_url http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-0325.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0325.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3581.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3581.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3581
reference_id
reference_type
scores
0
value 0.04809
scoring_system epss
scoring_elements 0.89497
published_at 2026-04-13T12:55:00Z
1
value 0.04809
scoring_system epss
scoring_elements 0.89459
published_at 2026-04-01T12:55:00Z
2
value 0.04809
scoring_system epss
scoring_elements 0.89504
published_at 2026-04-11T12:55:00Z
3
value 0.04809
scoring_system epss
scoring_elements 0.89501
published_at 2026-04-12T12:55:00Z
4
value 0.04809
scoring_system epss
scoring_elements 0.89463
published_at 2026-04-02T12:55:00Z
5
value 0.04809
scoring_system epss
scoring_elements 0.89474
published_at 2026-04-04T12:55:00Z
6
value 0.04809
scoring_system epss
scoring_elements 0.89475
published_at 2026-04-07T12:55:00Z
7
value 0.04809
scoring_system epss
scoring_elements 0.89491
published_at 2026-04-08T12:55:00Z
8
value 0.04809
scoring_system epss
scoring_elements 0.89495
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3581
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/97027
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/97027
7
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://support.apple.com/HT205219
reference_id
reference_type
scores
url https://support.apple.com/HT205219
22
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
23
reference_url http://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/CHANGES?view=markup&pathrev=1627749
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/CHANGES?view=markup&pathrev=1627749
24
reference_url http://svn.apache.org/viewvc?view=revision&revision=1624234
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=revision&revision=1624234
25
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
26
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
27
reference_url http://www.securityfocus.com/bid/71656
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71656
28
reference_url http://www.securitytracker.com/id/1031005
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031005
29
reference_url http://www.ubuntu.com/usn/USN-2523-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2523-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1149709
reference_id 1149709
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1149709
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
62
reference_url https://httpd.apache.org/security/json/CVE-2014-3581.json
reference_id CVE-2014-3581
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2014-3581.json
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3581
reference_id CVE-2014-3581
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3581
64
reference_url https://security.gentoo.org/glsa/201610-02
reference_id GLSA-201610-02
reference_type
scores
url https://security.gentoo.org/glsa/201610-02
65
reference_url https://access.redhat.com/errata/RHSA-2014:1972
reference_id RHSA-2014:1972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1972
66
reference_url https://access.redhat.com/errata/RHSA-2015:0325
reference_id RHSA-2015:0325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0325
67
reference_url https://access.redhat.com/errata/RHSA-2015:2661
reference_id RHSA-2015:2661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2661
68
reference_url https://usn.ubuntu.com/2523-1/
reference_id USN-2523-1
reference_type
scores
url https://usn.ubuntu.com/2523-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2014-3581
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnxp-n271-mfd8
66
url VCID-fqem-96w3-rucb
vulnerability_id VCID-fqem-96w3-rucb
summary When generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1312.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1312
reference_id
reference_type
scores
0
value 0.0728
scoring_system epss
scoring_elements 0.91622
published_at 2026-04-01T12:55:00Z
1
value 0.0728
scoring_system epss
scoring_elements 0.91663
published_at 2026-04-13T12:55:00Z
2
value 0.0728
scoring_system epss
scoring_elements 0.91661
published_at 2026-04-09T12:55:00Z
3
value 0.0728
scoring_system epss
scoring_elements 0.91664
published_at 2026-04-11T12:55:00Z
4
value 0.0728
scoring_system epss
scoring_elements 0.91667
published_at 2026-04-12T12:55:00Z
5
value 0.0728
scoring_system epss
scoring_elements 0.91629
published_at 2026-04-02T12:55:00Z
6
value 0.0728
scoring_system epss
scoring_elements 0.91634
published_at 2026-04-04T12:55:00Z
7
value 0.0728
scoring_system epss
scoring_elements 0.91642
published_at 2026-04-07T12:55:00Z
8
value 0.0728
scoring_system epss
scoring_elements 0.91655
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560634
reference_id 1560634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560634
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2018-1312.json
reference_id CVE-2018-1312
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1312.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2019:1898
reference_id RHSA-2019:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1898
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
18
reference_url https://usn.ubuntu.com/3937-2/
reference_id USN-3937-2
reference_type
scores
url https://usn.ubuntu.com/3937-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-1312
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fqem-96w3-rucb
67
url VCID-fsh3-7b9j-dfgf
vulnerability_id VCID-fsh3-7b9j-dfgf
summary
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-65082.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-65082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-65082
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36463
published_at 2026-04-04T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.3643
published_at 2026-04-02T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37416
published_at 2026-04-13T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37463
published_at 2026-04-09T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37477
published_at 2026-04-11T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37443
published_at 2026-04-12T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37399
published_at 2026-04-07T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37451
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-65082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419139
reference_id 2419139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419139
6
reference_url https://httpd.apache.org/security/json/CVE-2025-65082.json
reference_id CVE-2025-65082
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-65082.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
11
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
12
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-65082
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fsh3-7b9j-dfgf
68
url VCID-ftjw-9fb6-d3cw
vulnerability_id VCID-ftjw-9fb6-d3cw
summary
Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38473.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38473.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38473
reference_id
reference_type
scores
0
value 0.88261
scoring_system epss
scoring_elements 0.99492
published_at 2026-04-13T12:55:00Z
1
value 0.88261
scoring_system epss
scoring_elements 0.99486
published_at 2026-04-02T12:55:00Z
2
value 0.88261
scoring_system epss
scoring_elements 0.99488
published_at 2026-04-04T12:55:00Z
3
value 0.88261
scoring_system epss
scoring_elements 0.9949
published_at 2026-04-07T12:55:00Z
4
value 0.88261
scoring_system epss
scoring_elements 0.99491
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38473
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295012
reference_id 2295012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295012
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38473.json
reference_id CVE-2024-38473
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38473.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-24T13:55:35Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:4720
reference_id RHSA-2024:4720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4720
15
reference_url https://access.redhat.com/errata/RHSA-2024:4726
reference_id RHSA-2024:4726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4726
16
reference_url https://access.redhat.com/errata/RHSA-2024:5001
reference_id RHSA-2024:5001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5001
17
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
18
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
19
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-38473
risk_score 10.0
exploitability 2.0
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftjw-9fb6-d3cw
69
url VCID-fyrq-yg2u-jkc7
vulnerability_id VCID-fyrq-yg2u-jkc7
summary mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7679.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7679.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7679
reference_id
reference_type
scores
0
value 0.30062
scoring_system epss
scoring_elements 0.96661
published_at 2026-04-13T12:55:00Z
1
value 0.31057
scoring_system epss
scoring_elements 0.96725
published_at 2026-04-02T12:55:00Z
2
value 0.31057
scoring_system epss
scoring_elements 0.96715
published_at 2026-04-01T12:55:00Z
3
value 0.31057
scoring_system epss
scoring_elements 0.9673
published_at 2026-04-07T12:55:00Z
4
value 0.31057
scoring_system epss
scoring_elements 0.96738
published_at 2026-04-08T12:55:00Z
5
value 0.31057
scoring_system epss
scoring_elements 0.96739
published_at 2026-04-09T12:55:00Z
6
value 0.31057
scoring_system epss
scoring_elements 0.96742
published_at 2026-04-12T12:55:00Z
7
value 0.31057
scoring_system epss
scoring_elements 0.96726
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7679
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1463207
reference_id 1463207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1463207
8
reference_url https://security.archlinux.org/ASA-201706-34
reference_id ASA-201706-34
reference_type
scores
url https://security.archlinux.org/ASA-201706-34
9
reference_url https://security.archlinux.org/AVG-316
reference_id AVG-316
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-316
10
reference_url https://httpd.apache.org/security/json/CVE-2017-7679.json
reference_id CVE-2017-7679
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-7679.json
11
reference_url https://security.gentoo.org/glsa/201710-32
reference_id GLSA-201710-32
reference_type
scores
url https://security.gentoo.org/glsa/201710-32
12
reference_url https://access.redhat.com/errata/RHSA-2017:2478
reference_id RHSA-2017:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2478
13
reference_url https://access.redhat.com/errata/RHSA-2017:2479
reference_id RHSA-2017:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2479
14
reference_url https://access.redhat.com/errata/RHSA-2017:2483
reference_id RHSA-2017:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2483
15
reference_url https://access.redhat.com/errata/RHSA-2017:3193
reference_id RHSA-2017:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3193
16
reference_url https://access.redhat.com/errata/RHSA-2017:3194
reference_id RHSA-2017:3194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3194
17
reference_url https://access.redhat.com/errata/RHSA-2017:3195
reference_id RHSA-2017:3195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3195
18
reference_url https://access.redhat.com/errata/RHSA-2017:3475
reference_id RHSA-2017:3475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3475
19
reference_url https://access.redhat.com/errata/RHSA-2017:3476
reference_id RHSA-2017:3476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3476
20
reference_url https://access.redhat.com/errata/RHSA-2017:3477
reference_id RHSA-2017:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3477
21
reference_url https://usn.ubuntu.com/3340-1/
reference_id USN-3340-1
reference_type
scores
url https://usn.ubuntu.com/3340-1/
22
reference_url https://usn.ubuntu.com/3373-1/
reference_id USN-3373-1
reference_type
scores
url https://usn.ubuntu.com/3373-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-7679
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fyrq-yg2u-jkc7
70
url VCID-fz8c-b8r4-1yb8
vulnerability_id VCID-fz8c-b8r4-1yb8
summary
A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.

This issue affects Apache HTTP Server 2.4.54 and earlier.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-20001.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-20001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-20001
reference_id
reference_type
scores
0
value 0.00439
scoring_system epss
scoring_elements 0.63051
published_at 2026-04-01T12:55:00Z
1
value 0.00439
scoring_system epss
scoring_elements 0.63154
published_at 2026-04-13T12:55:00Z
2
value 0.00439
scoring_system epss
scoring_elements 0.63157
published_at 2026-04-08T12:55:00Z
3
value 0.00439
scoring_system epss
scoring_elements 0.63174
published_at 2026-04-09T12:55:00Z
4
value 0.00439
scoring_system epss
scoring_elements 0.63191
published_at 2026-04-11T12:55:00Z
5
value 0.00439
scoring_system epss
scoring_elements 0.63176
published_at 2026-04-12T12:55:00Z
6
value 0.00439
scoring_system epss
scoring_elements 0.6311
published_at 2026-04-02T12:55:00Z
7
value 0.00439
scoring_system epss
scoring_elements 0.6314
published_at 2026-04-04T12:55:00Z
8
value 0.00439
scoring_system epss
scoring_elements 0.63105
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-20001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161774
reference_id 2161774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161774
9
reference_url https://security.archlinux.org/AVG-2824
reference_id AVG-2824
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2824
10
reference_url https://httpd.apache.org/security/json/CVE-2006-20001.json
reference_id CVE-2006-20001
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2006-20001.json
11
reference_url https://access.redhat.com/errata/RHSA-2023:0852
reference_id RHSA-2023:0852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0852
12
reference_url https://access.redhat.com/errata/RHSA-2023:0970
reference_id RHSA-2023:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0970
13
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
14
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
15
reference_url https://usn.ubuntu.com/5834-1/
reference_id USN-5834-1
reference_type
scores
url https://usn.ubuntu.com/5834-1/
16
reference_url https://usn.ubuntu.com/5839-1/
reference_id USN-5839-1
reference_type
scores
url https://usn.ubuntu.com/5839-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2006-20001
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fz8c-b8r4-1yb8
71
url VCID-g55m-t4s1-nfhv
vulnerability_id VCID-g55m-t4s1-nfhv
summary
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data.

This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23943.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23943.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23943
reference_id
reference_type
scores
0
value 0.60552
scoring_system epss
scoring_elements 0.98286
published_at 2026-04-13T12:55:00Z
1
value 0.60552
scoring_system epss
scoring_elements 0.98284
published_at 2026-04-11T12:55:00Z
2
value 0.60552
scoring_system epss
scoring_elements 0.98285
published_at 2026-04-12T12:55:00Z
3
value 0.60552
scoring_system epss
scoring_elements 0.98273
published_at 2026-04-02T12:55:00Z
4
value 0.60552
scoring_system epss
scoring_elements 0.98275
published_at 2026-04-07T12:55:00Z
5
value 0.60552
scoring_system epss
scoring_elements 0.9828
published_at 2026-04-08T12:55:00Z
6
value 0.60552
scoring_system epss
scoring_elements 0.98281
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23943
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064319
reference_id 2064319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064319
5
reference_url https://httpd.apache.org/security/json/CVE-2022-23943.json
reference_id CVE-2022-23943
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-23943.json
6
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
7
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
8
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
9
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
10
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
11
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
12
reference_url https://usn.ubuntu.com/5333-1/
reference_id USN-5333-1
reference_type
scores
url https://usn.ubuntu.com/5333-1/
13
reference_url https://usn.ubuntu.com/5333-2/
reference_id USN-5333-2
reference_type
scores
url https://usn.ubuntu.com/5333-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-23943
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g55m-t4s1-nfhv
72
url VCID-g6xr-qtwz-2yaq
vulnerability_id VCID-g6xr-qtwz-2yaq
summary Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30641.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30641
reference_id
reference_type
scores
0
value 0.36362
scoring_system epss
scoring_elements 0.97082
published_at 2026-04-01T12:55:00Z
1
value 0.36362
scoring_system epss
scoring_elements 0.97111
published_at 2026-04-13T12:55:00Z
2
value 0.36362
scoring_system epss
scoring_elements 0.97105
published_at 2026-04-09T12:55:00Z
3
value 0.36362
scoring_system epss
scoring_elements 0.97109
published_at 2026-04-11T12:55:00Z
4
value 0.36362
scoring_system epss
scoring_elements 0.9711
published_at 2026-04-12T12:55:00Z
5
value 0.36362
scoring_system epss
scoring_elements 0.97089
published_at 2026-04-02T12:55:00Z
6
value 0.36362
scoring_system epss
scoring_elements 0.97094
published_at 2026-04-04T12:55:00Z
7
value 0.36362
scoring_system epss
scoring_elements 0.97095
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30641
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1966743
reference_id 1966743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1966743
9
reference_url https://security.archlinux.org/AVG-2053
reference_id AVG-2053
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2053
10
reference_url https://httpd.apache.org/security/json/CVE-2021-30641.json
reference_id CVE-2021-30641
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-30641.json
11
reference_url https://security.gentoo.org/glsa/202107-38
reference_id GLSA-202107-38
reference_type
scores
url https://security.gentoo.org/glsa/202107-38
12
reference_url https://access.redhat.com/errata/RHSA-2021:4257
reference_id RHSA-2021:4257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4257
13
reference_url https://access.redhat.com/errata/RHSA-2021:4613
reference_id RHSA-2021:4613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4613
14
reference_url https://access.redhat.com/errata/RHSA-2021:4614
reference_id RHSA-2021:4614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4614
15
reference_url https://usn.ubuntu.com/4994-1/
reference_id USN-4994-1
reference_type
scores
url https://usn.ubuntu.com/4994-1/
16
reference_url https://usn.ubuntu.com/4994-2/
reference_id USN-4994-2
reference_type
scores
url https://usn.ubuntu.com/4994-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-30641
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6xr-qtwz-2yaq
73
url VCID-gqat-458a-67g2
vulnerability_id VCID-gqat-458a-67g2
summary A stack recursion crash in the mod_lua module was found. A Lua script executing the r:wsupgrade() function could crash the process if a malicious client sent a carefully crafted PING request. This issue affected releases 2.4.7 through 2.4.12 inclusive.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0228.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0228
reference_id
reference_type
scores
0
value 0.18715
scoring_system epss
scoring_elements 0.95283
published_at 2026-04-13T12:55:00Z
1
value 0.18715
scoring_system epss
scoring_elements 0.95245
published_at 2026-04-01T12:55:00Z
2
value 0.18715
scoring_system epss
scoring_elements 0.95257
published_at 2026-04-02T12:55:00Z
3
value 0.18715
scoring_system epss
scoring_elements 0.9526
published_at 2026-04-04T12:55:00Z
4
value 0.18715
scoring_system epss
scoring_elements 0.95264
published_at 2026-04-07T12:55:00Z
5
value 0.18715
scoring_system epss
scoring_elements 0.95272
published_at 2026-04-08T12:55:00Z
6
value 0.18715
scoring_system epss
scoring_elements 0.95275
published_at 2026-04-09T12:55:00Z
7
value 0.18715
scoring_system epss
scoring_elements 0.9528
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0228
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1202988
reference_id 1202988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1202988
4
reference_url https://httpd.apache.org/security/json/CVE-2015-0228.json
reference_id CVE-2015-0228
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2015-0228.json
5
reference_url https://access.redhat.com/errata/RHSA-2015:1666
reference_id RHSA-2015:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1666
6
reference_url https://usn.ubuntu.com/2523-1/
reference_id USN-2523-1
reference_type
scores
url https://usn.ubuntu.com/2523-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2015-0228
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqat-458a-67g2
74
url VCID-gu44-7hkr-muae
vulnerability_id VCID-gu44-7hkr-muae
summary An additional exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4317.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4317
reference_id
reference_type
scores
0
value 0.81918
scoring_system epss
scoring_elements 0.99197
published_at 2026-04-04T12:55:00Z
1
value 0.81918
scoring_system epss
scoring_elements 0.99193
published_at 2026-04-01T12:55:00Z
2
value 0.81918
scoring_system epss
scoring_elements 0.99195
published_at 2026-04-02T12:55:00Z
3
value 0.81918
scoring_system epss
scoring_elements 0.99203
published_at 2026-04-12T12:55:00Z
4
value 0.81918
scoring_system epss
scoring_elements 0.99201
published_at 2026-04-13T12:55:00Z
5
value 0.81918
scoring_system epss
scoring_elements 0.99202
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=756483
reference_id 756483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=756483
4
reference_url https://httpd.apache.org/security/json/CVE-2011-4317.json
reference_id CVE-2011-4317
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-4317.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36352.txt
reference_id CVE-2011-4317;OSVDB-77310
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36352.txt
6
reference_url https://www.securityfocus.com/bid/50802/info
reference_id CVE-2011-4317;OSVDB-77310
reference_type exploit
scores
url https://www.securityfocus.com/bid/50802/info
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2011-4317
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gu44-7hkr-muae
75
url VCID-gv84-vfvh-y7hu
vulnerability_id VCID-gv84-vfvh-y7hu
summary If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30522.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30522
reference_id
reference_type
scores
0
value 0.11589
scoring_system epss
scoring_elements 0.93644
published_at 2026-04-13T12:55:00Z
1
value 0.11589
scoring_system epss
scoring_elements 0.93636
published_at 2026-04-08T12:55:00Z
2
value 0.11589
scoring_system epss
scoring_elements 0.93638
published_at 2026-04-09T12:55:00Z
3
value 0.11589
scoring_system epss
scoring_elements 0.93643
published_at 2026-04-12T12:55:00Z
4
value 0.11589
scoring_system epss
scoring_elements 0.93616
published_at 2026-04-02T12:55:00Z
5
value 0.11589
scoring_system epss
scoring_elements 0.93625
published_at 2026-04-04T12:55:00Z
6
value 0.11589
scoring_system epss
scoring_elements 0.93627
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30522
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
reference_id 1012513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2095015
reference_id 2095015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2095015
6
reference_url https://security.archlinux.org/AVG-2763
reference_id AVG-2763
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2763
7
reference_url https://httpd.apache.org/security/json/CVE-2022-30522.json
reference_id CVE-2022-30522
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-30522.json
8
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
9
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
10
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
11
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
12
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
13
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
14
reference_url https://usn.ubuntu.com/5487-1/
reference_id USN-5487-1
reference_type
scores
url https://usn.ubuntu.com/5487-1/
15
reference_url https://usn.ubuntu.com/5487-3/
reference_id USN-5487-3
reference_type
scores
url https://usn.ubuntu.com/5487-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-30522
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gv84-vfvh-y7hu
76
url VCID-h6kk-81jx-h7b8
vulnerability_id VCID-h6kk-81jx-h7b8
summary Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10098.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10098
reference_id
reference_type
scores
0
value 0.80306
scoring_system epss
scoring_elements 0.99111
published_at 2026-04-01T12:55:00Z
1
value 0.80306
scoring_system epss
scoring_elements 0.99114
published_at 2026-04-04T12:55:00Z
2
value 0.80306
scoring_system epss
scoring_elements 0.99119
published_at 2026-04-11T12:55:00Z
3
value 0.80306
scoring_system epss
scoring_elements 0.99117
published_at 2026-04-07T12:55:00Z
4
value 0.80306
scoring_system epss
scoring_elements 0.99112
published_at 2026-04-02T12:55:00Z
5
value 0.80306
scoring_system epss
scoring_elements 0.9912
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
9
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
21
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuApr2021.html
22
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
23
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
24
reference_url http://www.openwall.com/lists/oss-security/2020/04/01/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/04/01/4
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743959
reference_id 1743959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743959
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
27
reference_url https://0day.work/open-redirects-in-improperly-configured-mod_rewrite-rules-poc-for-cve-2019-10098/
reference_id CVE-2019-10098
reference_type exploit
scores
url https://0day.work/open-redirects-in-improperly-configured-mod_rewrite-rules-poc-for-cve-2019-10098/
28
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/47689.md
reference_id CVE-2019-10098
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/47689.md
29
reference_url https://httpd.apache.org/security/json/CVE-2019-10098.json
reference_id CVE-2019-10098
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-10098.json
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10098
reference_id CVE-2019-10098
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-10098
31
reference_url https://security.gentoo.org/glsa/201909-04
reference_id GLSA-201909-04
reference_type
scores
url https://security.gentoo.org/glsa/201909-04
32
reference_url https://access.redhat.com/errata/RHSA-2020:1336
reference_id RHSA-2020:1336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1336
33
reference_url https://access.redhat.com/errata/RHSA-2020:1337
reference_id RHSA-2020:1337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1337
34
reference_url https://access.redhat.com/errata/RHSA-2020:2263
reference_id RHSA-2020:2263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2263
35
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
36
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
37
reference_url https://usn.ubuntu.com/4113-1/
reference_id USN-4113-1
reference_type
scores
url https://usn.ubuntu.com/4113-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
2
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2019-10098
risk_score 10.0
exploitability 2.0
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6kk-81jx-h7b8
77
url VCID-ha7f-21gy-3qa2
vulnerability_id VCID-ha7f-21gy-3qa2
summary
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server.

This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63.

Users are recommended to upgrade to version 2.4.64, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53020.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53020.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53020
reference_id
reference_type
scores
0
value 0.00918
scoring_system epss
scoring_elements 0.75875
published_at 2026-04-02T12:55:00Z
1
value 0.00918
scoring_system epss
scoring_elements 0.75907
published_at 2026-04-04T12:55:00Z
2
value 0.01211
scoring_system epss
scoring_elements 0.78995
published_at 2026-04-13T12:55:00Z
3
value 0.01211
scoring_system epss
scoring_elements 0.78997
published_at 2026-04-09T12:55:00Z
4
value 0.01211
scoring_system epss
scoring_elements 0.79021
published_at 2026-04-11T12:55:00Z
5
value 0.01211
scoring_system epss
scoring_elements 0.79006
published_at 2026-04-12T12:55:00Z
6
value 0.01211
scoring_system epss
scoring_elements 0.78966
published_at 2026-04-07T12:55:00Z
7
value 0.01211
scoring_system epss
scoring_elements 0.7899
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53020
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53020
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2379343
reference_id 2379343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2379343
5
reference_url https://httpd.apache.org/security/json/CVE-2025-53020.json
reference_id CVE-2025-53020
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-53020.json
6
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
7
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-53020
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ha7f-21gy-3qa2
78
url VCID-hm3f-m22n-u3gy
vulnerability_id VCID-hm3f-m22n-u3gy
summary Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30556.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30556
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66229
published_at 2026-04-13T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66253
published_at 2026-04-09T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.66273
published_at 2026-04-11T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.6626
published_at 2026-04-12T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66195
published_at 2026-04-02T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.66222
published_at 2026-04-04T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.66192
published_at 2026-04-07T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.6624
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
reference_id 1012513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2095018
reference_id 2095018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2095018
6
reference_url https://security.archlinux.org/AVG-2763
reference_id AVG-2763
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2763
7
reference_url https://httpd.apache.org/security/json/CVE-2022-30556.json
reference_id CVE-2022-30556
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-30556.json
8
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
9
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
10
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
11
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
12
reference_url https://usn.ubuntu.com/5487-1/
reference_id USN-5487-1
reference_type
scores
url https://usn.ubuntu.com/5487-1/
13
reference_url https://usn.ubuntu.com/5487-3/
reference_id USN-5487-3
reference_type
scores
url https://usn.ubuntu.com/5487-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-30556
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hm3f-m22n-u3gy
79
url VCID-hqr4-pu6e-5uft
vulnerability_id VCID-hqr4-pu6e-5uft
summary regression update
references
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases DSA-3325-2 apache2
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hqr4-pu6e-5uft
80
url VCID-htfx-mahy-9kde
vulnerability_id VCID-htfx-mahy-9kde
summary Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37436.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37436
reference_id
reference_type
scores
0
value 0.00463
scoring_system epss
scoring_elements 0.64237
published_at 2026-04-13T12:55:00Z
1
value 0.00463
scoring_system epss
scoring_elements 0.64235
published_at 2026-04-04T12:55:00Z
2
value 0.00463
scoring_system epss
scoring_elements 0.64196
published_at 2026-04-07T12:55:00Z
3
value 0.00463
scoring_system epss
scoring_elements 0.64246
published_at 2026-04-08T12:55:00Z
4
value 0.00463
scoring_system epss
scoring_elements 0.64262
published_at 2026-04-09T12:55:00Z
5
value 0.00463
scoring_system epss
scoring_elements 0.64275
published_at 2026-04-11T12:55:00Z
6
value 0.00463
scoring_system epss
scoring_elements 0.64264
published_at 2026-04-12T12:55:00Z
7
value 0.00463
scoring_system epss
scoring_elements 0.64208
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37436
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161773
reference_id 2161773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161773
9
reference_url https://security.archlinux.org/AVG-2824
reference_id AVG-2824
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2824
10
reference_url https://httpd.apache.org/security/json/CVE-2022-37436.json
reference_id CVE-2022-37436
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2022-37436.json
11
reference_url https://access.redhat.com/errata/RHSA-2023:0852
reference_id RHSA-2023:0852
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0852
12
reference_url https://access.redhat.com/errata/RHSA-2023:0970
reference_id RHSA-2023:0970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0970
13
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
14
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
15
reference_url https://usn.ubuntu.com/5839-1/
reference_id USN-5839-1
reference_type
scores
url https://usn.ubuntu.com/5839-1/
16
reference_url https://usn.ubuntu.com/5839-2/
reference_id USN-5839-2
reference_type
scores
url https://usn.ubuntu.com/5839-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-37436
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htfx-mahy-9kde
81
url VCID-jt89-ruvk-1kbj
vulnerability_id VCID-jt89-ruvk-1kbj
summary The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9788.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9788
reference_id
reference_type
scores
0
value 0.52641
scoring_system epss
scoring_elements 0.97921
published_at 2026-04-01T12:55:00Z
1
value 0.52641
scoring_system epss
scoring_elements 0.97944
published_at 2026-04-13T12:55:00Z
2
value 0.52641
scoring_system epss
scoring_elements 0.97934
published_at 2026-04-08T12:55:00Z
3
value 0.52641
scoring_system epss
scoring_elements 0.97937
published_at 2026-04-09T12:55:00Z
4
value 0.52641
scoring_system epss
scoring_elements 0.97941
published_at 2026-04-11T12:55:00Z
5
value 0.52641
scoring_system epss
scoring_elements 0.97942
published_at 2026-04-12T12:55:00Z
6
value 0.52641
scoring_system epss
scoring_elements 0.97924
published_at 2026-04-02T12:55:00Z
7
value 0.52641
scoring_system epss
scoring_elements 0.97926
published_at 2026-04-04T12:55:00Z
8
value 0.52641
scoring_system epss
scoring_elements 0.97929
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:P
1
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1470748
reference_id 1470748
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1470748
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868467
reference_id 868467
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868467
6
reference_url https://security.archlinux.org/ASA-201707-15
reference_id ASA-201707-15
reference_type
scores
url https://security.archlinux.org/ASA-201707-15
7
reference_url https://security.archlinux.org/AVG-350
reference_id AVG-350
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-350
8
reference_url https://httpd.apache.org/security/json/CVE-2017-9788.json
reference_id CVE-2017-9788
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-9788.json
9
reference_url https://security.gentoo.org/glsa/201710-32
reference_id GLSA-201710-32
reference_type
scores
url https://security.gentoo.org/glsa/201710-32
10
reference_url https://access.redhat.com/errata/RHSA-2017:2478
reference_id RHSA-2017:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2478
11
reference_url https://access.redhat.com/errata/RHSA-2017:2479
reference_id RHSA-2017:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2479
12
reference_url https://access.redhat.com/errata/RHSA-2017:2483
reference_id RHSA-2017:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2483
13
reference_url https://access.redhat.com/errata/RHSA-2017:2708
reference_id RHSA-2017:2708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2708
14
reference_url https://access.redhat.com/errata/RHSA-2017:2709
reference_id RHSA-2017:2709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2709
15
reference_url https://access.redhat.com/errata/RHSA-2017:2710
reference_id RHSA-2017:2710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2710
16
reference_url https://access.redhat.com/errata/RHSA-2017:3193
reference_id RHSA-2017:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3193
17
reference_url https://access.redhat.com/errata/RHSA-2017:3194
reference_id RHSA-2017:3194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3194
18
reference_url https://access.redhat.com/errata/RHSA-2017:3195
reference_id RHSA-2017:3195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3195
19
reference_url https://access.redhat.com/errata/RHSA-2017:3239
reference_id RHSA-2017:3239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3239
20
reference_url https://access.redhat.com/errata/RHSA-2017:3240
reference_id RHSA-2017:3240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3240
21
reference_url https://usn.ubuntu.com/3370-1/
reference_id USN-3370-1
reference_type
scores
url https://usn.ubuntu.com/3370-1/
22
reference_url https://usn.ubuntu.com/3370-2/
reference_id USN-3370-2
reference_type
scores
url https://usn.ubuntu.com/3370-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-9788
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jt89-ruvk-1kbj
82
url VCID-jzuw-73df-mfff
vulnerability_id VCID-jzuw-73df-mfff
summary A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.33, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1301.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1301
reference_id
reference_type
scores
0
value 0.07499
scoring_system epss
scoring_elements 0.91755
published_at 2026-04-01T12:55:00Z
1
value 0.07499
scoring_system epss
scoring_elements 0.91798
published_at 2026-04-13T12:55:00Z
2
value 0.07499
scoring_system epss
scoring_elements 0.91797
published_at 2026-04-09T12:55:00Z
3
value 0.07499
scoring_system epss
scoring_elements 0.918
published_at 2026-04-11T12:55:00Z
4
value 0.07499
scoring_system epss
scoring_elements 0.91802
published_at 2026-04-12T12:55:00Z
5
value 0.07499
scoring_system epss
scoring_elements 0.91764
published_at 2026-04-02T12:55:00Z
6
value 0.07499
scoring_system epss
scoring_elements 0.9177
published_at 2026-04-04T12:55:00Z
7
value 0.07499
scoring_system epss
scoring_elements 0.91777
published_at 2026-04-07T12:55:00Z
8
value 0.07499
scoring_system epss
scoring_elements 0.9179
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1301
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560643
reference_id 1560643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560643
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2018-1301.json
reference_id CVE-2018-1301
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1301.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:1121
reference_id RHSA-2020:1121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1121
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
18
reference_url https://usn.ubuntu.com/3937-2/
reference_id USN-3937-2
reference_type
scores
url https://usn.ubuntu.com/3937-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-1301
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzuw-73df-mfff
83
url VCID-k4kb-21tp-4kc8
vulnerability_id VCID-k4kb-21tp-4kc8
summary An HTTP request smuggling attack was possible due to a bug in parsing of chunked requests. A malicious client could force the server to misinterpret the request length, allowing cache poisoning or credential hijacking if an intermediary proxy is in use.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3183.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3183.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3183
reference_id
reference_type
scores
0
value 0.28343
scoring_system epss
scoring_elements 0.96477
published_at 2026-04-01T12:55:00Z
1
value 0.28343
scoring_system epss
scoring_elements 0.96485
published_at 2026-04-02T12:55:00Z
2
value 0.28343
scoring_system epss
scoring_elements 0.96489
published_at 2026-04-04T12:55:00Z
3
value 0.28343
scoring_system epss
scoring_elements 0.96494
published_at 2026-04-07T12:55:00Z
4
value 0.28343
scoring_system epss
scoring_elements 0.96502
published_at 2026-04-08T12:55:00Z
5
value 0.28343
scoring_system epss
scoring_elements 0.96505
published_at 2026-04-09T12:55:00Z
6
value 0.28343
scoring_system epss
scoring_elements 0.96508
published_at 2026-04-12T12:55:00Z
7
value 0.28343
scoring_system epss
scoring_elements 0.96511
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3183
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243887
reference_id 1243887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243887
5
reference_url https://httpd.apache.org/security/json/CVE-2015-3183.json
reference_id CVE-2015-3183
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2015-3183.json
6
reference_url https://security.gentoo.org/glsa/201610-02
reference_id GLSA-201610-02
reference_type
scores
url https://security.gentoo.org/glsa/201610-02
7
reference_url https://access.redhat.com/errata/RHSA-2015:1666
reference_id RHSA-2015:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1666
8
reference_url https://access.redhat.com/errata/RHSA-2015:1667
reference_id RHSA-2015:1667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1667
9
reference_url https://access.redhat.com/errata/RHSA-2015:1668
reference_id RHSA-2015:1668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1668
10
reference_url https://access.redhat.com/errata/RHSA-2015:2661
reference_id RHSA-2015:2661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2661
11
reference_url https://access.redhat.com/errata/RHSA-2016:0061
reference_id RHSA-2016:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0061
12
reference_url https://access.redhat.com/errata/RHSA-2016:0062
reference_id RHSA-2016:0062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0062
13
reference_url https://access.redhat.com/errata/RHSA-2016:2054
reference_id RHSA-2016:2054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2054
14
reference_url https://access.redhat.com/errata/RHSA-2016:2055
reference_id RHSA-2016:2055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2055
15
reference_url https://access.redhat.com/errata/RHSA-2016:2056
reference_id RHSA-2016:2056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2056
16
reference_url https://usn.ubuntu.com/2686-1/
reference_id USN-2686-1
reference_type
scores
url https://usn.ubuntu.com/2686-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
1
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
2
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2015-3183
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4kb-21tp-4kc8
84
url VCID-k4nk-qqxg-s7e6
vulnerability_id VCID-k4nk-qqxg-s7e6
summary Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22720.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22720
reference_id
reference_type
scores
0
value 0.27458
scoring_system epss
scoring_elements 0.96418
published_at 2026-04-13T12:55:00Z
1
value 0.27458
scoring_system epss
scoring_elements 0.96414
published_at 2026-04-11T12:55:00Z
2
value 0.27458
scoring_system epss
scoring_elements 0.96415
published_at 2026-04-12T12:55:00Z
3
value 0.27458
scoring_system epss
scoring_elements 0.9639
published_at 2026-04-02T12:55:00Z
4
value 0.27458
scoring_system epss
scoring_elements 0.96395
published_at 2026-04-04T12:55:00Z
5
value 0.27458
scoring_system epss
scoring_elements 0.96398
published_at 2026-04-07T12:55:00Z
6
value 0.27458
scoring_system epss
scoring_elements 0.96407
published_at 2026-04-08T12:55:00Z
7
value 0.27458
scoring_system epss
scoring_elements 0.96409
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064321
reference_id 2064321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064321
5
reference_url https://httpd.apache.org/security/json/CVE-2022-22720.json
reference_id CVE-2022-22720
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-22720.json
6
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
7
reference_url https://access.redhat.com/errata/RHSA-2022:1045
reference_id RHSA-2022:1045
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1045
8
reference_url https://access.redhat.com/errata/RHSA-2022:1049
reference_id RHSA-2022:1049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1049
9
reference_url https://access.redhat.com/errata/RHSA-2022:1072
reference_id RHSA-2022:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1072
10
reference_url https://access.redhat.com/errata/RHSA-2022:1075
reference_id RHSA-2022:1075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1075
11
reference_url https://access.redhat.com/errata/RHSA-2022:1080
reference_id RHSA-2022:1080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1080
12
reference_url https://access.redhat.com/errata/RHSA-2022:1102
reference_id RHSA-2022:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1102
13
reference_url https://access.redhat.com/errata/RHSA-2022:1136
reference_id RHSA-2022:1136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1136
14
reference_url https://access.redhat.com/errata/RHSA-2022:1137
reference_id RHSA-2022:1137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1137
15
reference_url https://access.redhat.com/errata/RHSA-2022:1138
reference_id RHSA-2022:1138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1138
16
reference_url https://access.redhat.com/errata/RHSA-2022:1139
reference_id RHSA-2022:1139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1139
17
reference_url https://access.redhat.com/errata/RHSA-2022:1173
reference_id RHSA-2022:1173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1173
18
reference_url https://access.redhat.com/errata/RHSA-2022:1389
reference_id RHSA-2022:1389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1389
19
reference_url https://access.redhat.com/errata/RHSA-2022:1390
reference_id RHSA-2022:1390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1390
20
reference_url https://usn.ubuntu.com/5333-1/
reference_id USN-5333-1
reference_type
scores
url https://usn.ubuntu.com/5333-1/
21
reference_url https://usn.ubuntu.com/5333-2/
reference_id USN-5333-2
reference_type
scores
url https://usn.ubuntu.com/5333-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-22720
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4nk-qqxg-s7e6
85
url VCID-ke1s-451y-p3cz
vulnerability_id VCID-ke1s-451y-p3cz
summary A flaw was found in mod_log_config. A remote attacker could send a specific truncated cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0098.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0098
reference_id
reference_type
scores
0
value 0.4102
scoring_system epss
scoring_elements 0.9738
published_at 2026-04-13T12:55:00Z
1
value 0.4102
scoring_system epss
scoring_elements 0.97357
published_at 2026-04-01T12:55:00Z
2
value 0.4102
scoring_system epss
scoring_elements 0.97363
published_at 2026-04-02T12:55:00Z
3
value 0.4102
scoring_system epss
scoring_elements 0.97367
published_at 2026-04-04T12:55:00Z
4
value 0.4102
scoring_system epss
scoring_elements 0.97368
published_at 2026-04-07T12:55:00Z
5
value 0.4102
scoring_system epss
scoring_elements 0.97375
published_at 2026-04-08T12:55:00Z
6
value 0.4102
scoring_system epss
scoring_elements 0.97376
published_at 2026-04-09T12:55:00Z
7
value 0.4102
scoring_system epss
scoring_elements 0.97378
published_at 2026-04-11T12:55:00Z
8
value 0.4102
scoring_system epss
scoring_elements 0.97379
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1077871
reference_id 1077871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1077871
4
reference_url https://httpd.apache.org/security/json/CVE-2014-0098.json
reference_id CVE-2014-0098
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2014-0098.json
5
reference_url https://security.gentoo.org/glsa/201408-12
reference_id GLSA-201408-12
reference_type
scores
url https://security.gentoo.org/glsa/201408-12
6
reference_url https://access.redhat.com/errata/RHSA-2014:0369
reference_id RHSA-2014:0369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0369
7
reference_url https://access.redhat.com/errata/RHSA-2014:0370
reference_id RHSA-2014:0370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0370
8
reference_url https://access.redhat.com/errata/RHSA-2014:0783
reference_id RHSA-2014:0783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0783
9
reference_url https://access.redhat.com/errata/RHSA-2014:0784
reference_id RHSA-2014:0784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0784
10
reference_url https://access.redhat.com/errata/RHSA-2014:0825
reference_id RHSA-2014:0825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0825
11
reference_url https://access.redhat.com/errata/RHSA-2014:0826
reference_id RHSA-2014:0826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0826
12
reference_url https://usn.ubuntu.com/2152-1/
reference_id USN-2152-1
reference_type
scores
url https://usn.ubuntu.com/2152-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2014-0098
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ke1s-451y-p3cz
86
url VCID-kkfv-4jd1-bqdm
vulnerability_id VCID-kkfv-4jd1-bqdm
summary A flaw was found in the way the Apache HTTP Server handled Range HTTP headers. A remote attacker could use this flaw to cause httpd to use an excessive amount of memory and CPU time via HTTP requests with a specially-crafted Range header. This could be used in a denial of service attack. Advisory: CVE-2011-3192.txt
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3192.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3192
reference_id
reference_type
scores
0
value 0.90456
scoring_system epss
scoring_elements 0.99604
published_at 2026-04-02T12:55:00Z
1
value 0.90456
scoring_system epss
scoring_elements 0.99605
published_at 2026-04-04T12:55:00Z
2
value 0.90456
scoring_system epss
scoring_elements 0.99606
published_at 2026-04-07T12:55:00Z
3
value 0.90456
scoring_system epss
scoring_elements 0.99607
published_at 2026-04-13T12:55:00Z
4
value 0.90456
scoring_system epss
scoring_elements 0.99608
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=732928
reference_id 732928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=732928
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3192.json
reference_id CVE-2011-3192
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3192.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18221.c
reference_id CVE-2014-5329;OSVDB-74721;CVE-2011-3192
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18221.c
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17696.pl
reference_id CVE-2014-5329;OSVDB-74721;CVE-2011-3192
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17696.pl
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2011:1245
reference_id RHSA-2011:1245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1245
9
reference_url https://access.redhat.com/errata/RHSA-2011:1294
reference_id RHSA-2011:1294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1294
10
reference_url https://access.redhat.com/errata/RHSA-2011:1300
reference_id RHSA-2011:1300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1300
11
reference_url https://access.redhat.com/errata/RHSA-2011:1329
reference_id RHSA-2011:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1329
12
reference_url https://access.redhat.com/errata/RHSA-2011:1330
reference_id RHSA-2011:1330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1330
13
reference_url https://usn.ubuntu.com/1199-1/
reference_id USN-1199-1
reference_type
scores
url https://usn.ubuntu.com/1199-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2011-3192
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkfv-4jd1-bqdm
87
url VCID-kkuy-1j91-9bb2
vulnerability_id VCID-kkuy-1j91-9bb2
summary
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.

This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.

Users are recommended to upgrade to version 2.4.58, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45802.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45802
reference_id
reference_type
scores
0
value 0.01741
scoring_system epss
scoring_elements 0.82453
published_at 2026-04-02T12:55:00Z
1
value 0.01741
scoring_system epss
scoring_elements 0.82511
published_at 2026-04-13T12:55:00Z
2
value 0.01741
scoring_system epss
scoring_elements 0.8252
published_at 2026-04-11T12:55:00Z
3
value 0.01741
scoring_system epss
scoring_elements 0.82516
published_at 2026-04-12T12:55:00Z
4
value 0.01741
scoring_system epss
scoring_elements 0.82471
published_at 2026-04-04T12:55:00Z
5
value 0.01741
scoring_system epss
scoring_elements 0.82467
published_at 2026-04-07T12:55:00Z
6
value 0.01741
scoring_system epss
scoring_elements 0.82495
published_at 2026-04-08T12:55:00Z
7
value 0.01741
scoring_system epss
scoring_elements 0.82501
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2243877
reference_id 2243877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2243877
10
reference_url https://httpd.apache.org/security/json/CVE-2023-45802.json
reference_id CVE-2023-45802
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2023-45802.json
11
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
12
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
13
reference_url https://access.redhat.com/errata/RHSA-2024:2368
reference_id RHSA-2024:2368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2368
14
reference_url https://access.redhat.com/errata/RHSA-2024:2891
reference_id RHSA-2024:2891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2891
15
reference_url https://access.redhat.com/errata/RHSA-2024:3121
reference_id RHSA-2024:3121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3121
16
reference_url https://usn.ubuntu.com/6506-1/
reference_id USN-6506-1
reference_type
scores
url https://usn.ubuntu.com/6506-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2023-45802
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkuy-1j91-9bb2
88
url VCID-kpew-rarv-83dg
vulnerability_id VCID-kpew-rarv-83dg
summary A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0304.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0304.html
1
reference_url http://advisories.mageia.org/MGASA-2014-0305.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0305.html
2
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
3
reference_url http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
4
reference_url http://marc.info/?l=bugtraq&m=143403519711434&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143403519711434&w=2
5
reference_url http://marc.info/?l=bugtraq&m=143748090628601&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143748090628601&w=2
6
reference_url http://marc.info/?l=bugtraq&m=144050155601375&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144050155601375&w=2
7
reference_url http://marc.info/?l=bugtraq&m=144493176821532&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144493176821532&w=2
8
reference_url http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1019.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1019.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1020.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1020.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2014-1021.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1021.html
12
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0231.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0231.json
13
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0231
reference_id
reference_type
scores
0
value 0.44151
scoring_system epss
scoring_elements 0.97547
published_at 2026-04-13T12:55:00Z
1
value 0.44151
scoring_system epss
scoring_elements 0.97523
published_at 2026-04-01T12:55:00Z
2
value 0.44151
scoring_system epss
scoring_elements 0.97541
published_at 2026-04-09T12:55:00Z
3
value 0.44151
scoring_system epss
scoring_elements 0.97544
published_at 2026-04-11T12:55:00Z
4
value 0.44151
scoring_system epss
scoring_elements 0.9753
published_at 2026-04-02T12:55:00Z
5
value 0.44151
scoring_system epss
scoring_elements 0.97532
published_at 2026-04-04T12:55:00Z
6
value 0.44151
scoring_system epss
scoring_elements 0.97534
published_at 2026-04-07T12:55:00Z
7
value 0.44151
scoring_system epss
scoring_elements 0.97539
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0231
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
17
reference_url http://secunia.com/advisories/60536
reference_id
reference_type
scores
url http://secunia.com/advisories/60536
18
reference_url https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
reference_id
reference_type
scores
url https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
19
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
37
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
38
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
39
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
40
reference_url https://puppet.com/security/cve/cve-2014-0231
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2014-0231
41
reference_url https://support.apple.com/HT204659
reference_id
reference_type
scores
url https://support.apple.com/HT204659
42
reference_url http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
reference_id
reference_type
scores
url http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
43
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c
44
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1482522&r2=1535125&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1482522&r2=1535125&diff_format=h
45
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1565711&r2=1610509&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1565711&r2=1610509&diff_format=h
46
reference_url http://www.debian.org/security/2014/dsa-2989
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2989
47
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:142
48
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
49
reference_url http://www.securityfocus.com/bid/68742
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68742
50
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1120596
reference_id 1120596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1120596
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
52
reference_url https://httpd.apache.org/security/json/CVE-2014-0231.json
reference_id CVE-2014-0231
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2014-0231.json
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0231
reference_id CVE-2014-0231
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-0231
54
reference_url https://security.gentoo.org/glsa/201504-03
reference_id GLSA-201504-03
reference_type
scores
url https://security.gentoo.org/glsa/201504-03
55
reference_url https://access.redhat.com/errata/RHSA-2014:0920
reference_id RHSA-2014:0920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0920
56
reference_url https://access.redhat.com/errata/RHSA-2014:0921
reference_id RHSA-2014:0921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0921
57
reference_url https://access.redhat.com/errata/RHSA-2014:0922
reference_id RHSA-2014:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0922
58
reference_url https://access.redhat.com/errata/RHSA-2014:1019
reference_id RHSA-2014:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1019
59
reference_url https://access.redhat.com/errata/RHSA-2014:1020
reference_id RHSA-2014:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1020
60
reference_url https://access.redhat.com/errata/RHSA-2014:1021
reference_id RHSA-2014:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1021
61
reference_url https://access.redhat.com/errata/RHSA-2014:1086
reference_id RHSA-2014:1086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1086
62
reference_url https://access.redhat.com/errata/RHSA-2014:1087
reference_id RHSA-2014:1087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1087
63
reference_url https://access.redhat.com/errata/RHSA-2014:1088
reference_id RHSA-2014:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1088
64
reference_url https://usn.ubuntu.com/2299-1/
reference_id USN-2299-1
reference_type
scores
url https://usn.ubuntu.com/2299-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
1
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2014-0231
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpew-rarv-83dg
89
url VCID-kv7f-t14h-2bfv
vulnerability_id VCID-kv7f-t14h-2bfv
summary By manipulating the flow control windows on streams, a client was able to block server threads for long times, causing starvation of worker threads. Connections could still be opened, but no streams where processed for these. This issue affected HTTP/2 support in 2.4.17 and 2.4.18.
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1546.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1546.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1546
reference_id
reference_type
scores
0
value 0.41505
scoring_system epss
scoring_elements 0.97407
published_at 2026-04-13T12:55:00Z
1
value 0.41505
scoring_system epss
scoring_elements 0.97382
published_at 2026-04-01T12:55:00Z
2
value 0.41505
scoring_system epss
scoring_elements 0.97403
published_at 2026-04-09T12:55:00Z
3
value 0.41505
scoring_system epss
scoring_elements 0.97405
published_at 2026-04-11T12:55:00Z
4
value 0.41505
scoring_system epss
scoring_elements 0.97406
published_at 2026-04-12T12:55:00Z
5
value 0.41505
scoring_system epss
scoring_elements 0.97389
published_at 2026-04-02T12:55:00Z
6
value 0.41505
scoring_system epss
scoring_elements 0.97394
published_at 2026-04-04T12:55:00Z
7
value 0.41505
scoring_system epss
scoring_elements 0.97395
published_at 2026-04-07T12:55:00Z
8
value 0.41505
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1546
4
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://security.netapp.com/advisory/ntap-20180601-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180601-0001/
17
reference_url http://svn.apache.org/viewvc?view=revision&revision=1733727
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=revision&revision=1733727
18
reference_url http://www.apache.org/dist/httpd/CHANGES_2.4
reference_id
reference_type
scores
url http://www.apache.org/dist/httpd/CHANGES_2.4
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html
21
reference_url http://www.securityfocus.com/bid/92331
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/92331
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1336350
reference_id 1336350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1336350
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*
25
reference_url https://httpd.apache.org/security/json/CVE-2016-1546.json
reference_id CVE-2016-1546
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2016-1546.json
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1546
reference_id CVE-2016-1546
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1546
27
reference_url https://security.gentoo.org/glsa/201610-02
reference_id GLSA-201610-02
reference_type
scores
url https://security.gentoo.org/glsa/201610-02
28
reference_url https://access.redhat.com/errata/RHSA-2017:1161
reference_id RHSA-2017:1161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1161
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2016-1546
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kv7f-t14h-2bfv
90
url VCID-m9fd-9pya-xucw
vulnerability_id VCID-m9fd-9pya-xucw
summary A flaw was found in mod_proxy in httpd versions 2.4.6 to 2.4.9. A remote attacker could send a carefully crafted request to a server configured as a reverse proxy, and cause the child process to crash. This could lead to a denial of service against a threaded MPM.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0305.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0305.html
1
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
2
reference_url http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0117.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0117.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0117
reference_id
reference_type
scores
0
value 0.56996
scoring_system epss
scoring_elements 0.98139
published_at 2026-04-13T12:55:00Z
1
value 0.56996
scoring_system epss
scoring_elements 0.98123
published_at 2026-04-01T12:55:00Z
2
value 0.56996
scoring_system epss
scoring_elements 0.98135
published_at 2026-04-09T12:55:00Z
3
value 0.56996
scoring_system epss
scoring_elements 0.98138
published_at 2026-04-11T12:55:00Z
4
value 0.56996
scoring_system epss
scoring_elements 0.98125
published_at 2026-04-02T12:55:00Z
5
value 0.56996
scoring_system epss
scoring_elements 0.98129
published_at 2026-04-04T12:55:00Z
6
value 0.56996
scoring_system epss
scoring_elements 0.9813
published_at 2026-04-07T12:55:00Z
7
value 0.56996
scoring_system epss
scoring_elements 0.98134
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0117
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
6
reference_url http://seclists.org/fulldisclosure/2014/Jul/117
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Jul/117
7
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://support.apple.com/HT204659
reference_id
reference_type
scores
url https://support.apple.com/HT204659
20
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c
21
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486&r2=1610674&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486&r2=1610674&diff_format=h
22
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c
23
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680&r2=1610674&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680&r2=1610674&diff_format=h
24
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
25
reference_url http://zerodayinitiative.com/advisories/ZDI-14-239/
reference_id
reference_type
scores
url http://zerodayinitiative.com/advisories/ZDI-14-239/
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1120599
reference_id 1120599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1120599
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
32
reference_url https://httpd.apache.org/security/json/CVE-2014-0117.json
reference_id CVE-2014-0117
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2014-0117.json
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0117
reference_id CVE-2014-0117
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-0117
34
reference_url https://access.redhat.com/errata/RHSA-2014:0921
reference_id RHSA-2014:0921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0921
35
reference_url https://access.redhat.com/errata/RHSA-2014:0922
reference_id RHSA-2014:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0922
36
reference_url https://usn.ubuntu.com/2299-1/
reference_id USN-2299-1
reference_type
scores
url https://usn.ubuntu.com/2299-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2014-0117
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m9fd-9pya-xucw
91
url VCID-mtg7-8556-kbgd
vulnerability_id VCID-mtg7-8556-kbgd
summary
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user.

This issue affects Apache HTTP Server 2.4.48 and earlier.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-40438.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-40438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-40438
reference_id
reference_type
scores
0
value 0.94432
scoring_system epss
scoring_elements 0.99985
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-40438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2005117
reference_id 2005117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2005117
8
reference_url https://security.archlinux.org/AVG-2289
reference_id AVG-2289
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2289
9
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
reference_id cisco-sa-apache-httpd-2.4.49-VWL69sWQ
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
10
reference_url https://httpd.apache.org/security/json/CVE-2021-40438.json
reference_id CVE-2021-40438
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-40438.json
11
reference_url https://www.debian.org/security/2021/dsa-4982
reference_id dsa-4982
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://www.debian.org/security/2021/dsa-4982
12
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://security.gentoo.org/glsa/202208-20
13
reference_url https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
14
reference_url https://security.netapp.com/advisory/ntap-20211008-0004/
reference_id ntap-20211008-0004
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://security.netapp.com/advisory/ntap-20211008-0004/
15
reference_url https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E
reference_id r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E
reference_id r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E
reference_id r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E
reference_id r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E
reference_id r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E
reference_id r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E
reference_id rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E
22
reference_url https://access.redhat.com/errata/RHSA-2021:3745
reference_id RHSA-2021:3745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3745
23
reference_url https://access.redhat.com/errata/RHSA-2021:3746
reference_id RHSA-2021:3746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3746
24
reference_url https://access.redhat.com/errata/RHSA-2021:3754
reference_id RHSA-2021:3754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3754
25
reference_url https://access.redhat.com/errata/RHSA-2021:3816
reference_id RHSA-2021:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3816
26
reference_url https://access.redhat.com/errata/RHSA-2021:3836
reference_id RHSA-2021:3836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3836
27
reference_url https://access.redhat.com/errata/RHSA-2021:3837
reference_id RHSA-2021:3837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3837
28
reference_url https://access.redhat.com/errata/RHSA-2021:3856
reference_id RHSA-2021:3856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3856
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
reference_id SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
30
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf
reference_id ssa-685781.pdf
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf
31
reference_url https://www.tenable.com/security/tns-2021-17
reference_id tns-2021-17
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://www.tenable.com/security/tns-2021-17
32
reference_url https://usn.ubuntu.com/5090-1/
reference_id USN-5090-1
reference_type
scores
url https://usn.ubuntu.com/5090-1/
33
reference_url https://usn.ubuntu.com/5090-2/
reference_id USN-5090-2
reference_type
scores
url https://usn.ubuntu.com/5090-2/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
reference_id ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R
reference_type
scores
0
value 9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:08:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-40438
risk_score 10.0
exploitability 2.0
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtg7-8556-kbgd
92
url VCID-n76a-bbkc-tyhh
vulnerability_id VCID-n76a-bbkc-tyhh
summary The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618857
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618857
1
reference_url http://lists.err.no/pipermail/mpm-itk/2011-March/000393.html
reference_id
reference_type
scores
url http://lists.err.no/pipermail/mpm-itk/2011-March/000393.html
2
reference_url http://lists.err.no/pipermail/mpm-itk/2011-March/000394.html
reference_id
reference_type
scores
url http://lists.err.no/pipermail/mpm-itk/2011-March/000394.html
3
reference_url http://openwall.com/lists/oss-security/2011/03/20/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/20/1
4
reference_url http://openwall.com/lists/oss-security/2011/03/21/13
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/21/13
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1176
reference_id
reference_type
scores
0
value 0.0096
scoring_system epss
scoring_elements 0.76476
published_at 2026-04-13T12:55:00Z
1
value 0.0096
scoring_system epss
scoring_elements 0.76417
published_at 2026-04-01T12:55:00Z
2
value 0.0096
scoring_system epss
scoring_elements 0.76421
published_at 2026-04-02T12:55:00Z
3
value 0.0096
scoring_system epss
scoring_elements 0.76449
published_at 2026-04-04T12:55:00Z
4
value 0.0096
scoring_system epss
scoring_elements 0.76431
published_at 2026-04-07T12:55:00Z
5
value 0.0096
scoring_system epss
scoring_elements 0.76463
published_at 2026-04-08T12:55:00Z
6
value 0.0096
scoring_system epss
scoring_elements 0.76477
published_at 2026-04-09T12:55:00Z
7
value 0.0096
scoring_system epss
scoring_elements 0.76502
published_at 2026-04-11T12:55:00Z
8
value 0.0096
scoring_system epss
scoring_elements 0.76481
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1176
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1176
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66248
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66248
8
reference_url http://www.debian.org/security/2011/dsa-2202
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2202
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:057
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:057
10
reference_url http://www.securityfocus.com/bid/46953
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46953
11
reference_url http://www.vupen.com/english/advisories/2011/0748
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0748
12
reference_url http://www.vupen.com/english/advisories/2011/0749
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0749
13
reference_url http://www.vupen.com/english/advisories/2011/0824
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0824
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618857
reference_id 618857
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618857
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-01:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-02:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1176
reference_id CVE-2011-1176
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1176
22
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2011-1176
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n76a-bbkc-tyhh
93
url VCID-n9e1-c2zs-zkdk
vulnerability_id VCID-n9e1-c2zs-zkdk
summary A flaw was found when mod_proxy_ajp connects to a backend server that takes too long to respond. Given a specific configuration, a remote attacker could send certain requests, putting a backend server into an error state until the retry timeout expired. This could lead to a temporary denial of service.
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html
3
reference_url http://marc.info/?l=bugtraq&m=136612293908376&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136612293908376&w=2
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4557.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4557.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4557
reference_id
reference_type
scores
0
value 0.25967
scoring_system epss
scoring_elements 0.96274
published_at 2026-04-13T12:55:00Z
1
value 0.25967
scoring_system epss
scoring_elements 0.96235
published_at 2026-04-01T12:55:00Z
2
value 0.25967
scoring_system epss
scoring_elements 0.96266
published_at 2026-04-09T12:55:00Z
3
value 0.25967
scoring_system epss
scoring_elements 0.9627
published_at 2026-04-12T12:55:00Z
4
value 0.25967
scoring_system epss
scoring_elements 0.96242
published_at 2026-04-02T12:55:00Z
5
value 0.25967
scoring_system epss
scoring_elements 0.9625
published_at 2026-04-04T12:55:00Z
6
value 0.25967
scoring_system epss
scoring_elements 0.96254
published_at 2026-04-07T12:55:00Z
7
value 0.25967
scoring_system epss
scoring_elements 0.96263
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4557
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4557
7
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284
23
reference_url http://svn.apache.org/viewvc?view=revision&revision=1227298
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=revision&revision=1227298
24
reference_url http://www.debian.org/security/2012/dsa-2579
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2579
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=871685
reference_id 871685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=871685
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
36
reference_url https://httpd.apache.org/security/json/CVE-2012-4557.json
reference_id CVE-2012-4557
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-4557.json
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4557
reference_id CVE-2012-4557
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4557
38
reference_url https://access.redhat.com/errata/RHSA-2013:0512
reference_id RHSA-2013:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0512
39
reference_url https://usn.ubuntu.com/1765-1/
reference_id USN-1765-1
reference_type
scores
url https://usn.ubuntu.com/1765-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-4557
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n9e1-c2zs-zkdk
94
url VCID-na94-5565-dyfc
vulnerability_id VCID-na94-5565-dyfc
summary
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.

Modules compiled and distributed separately from Apache HTTP Server that use the "ap_rputs" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28614.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28614
reference_id
reference_type
scores
0
value 0.00593
scoring_system epss
scoring_elements 0.69266
published_at 2026-04-13T12:55:00Z
1
value 0.00593
scoring_system epss
scoring_elements 0.69289
published_at 2026-04-09T12:55:00Z
2
value 0.00593
scoring_system epss
scoring_elements 0.69311
published_at 2026-04-11T12:55:00Z
3
value 0.00593
scoring_system epss
scoring_elements 0.69295
published_at 2026-04-12T12:55:00Z
4
value 0.00593
scoring_system epss
scoring_elements 0.6922
published_at 2026-04-02T12:55:00Z
5
value 0.00593
scoring_system epss
scoring_elements 0.6924
published_at 2026-04-04T12:55:00Z
6
value 0.00593
scoring_system epss
scoring_elements 0.69221
published_at 2026-04-07T12:55:00Z
7
value 0.00593
scoring_system epss
scoring_elements 0.69271
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28614
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
reference_id 1012513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2095002
reference_id 2095002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2095002
6
reference_url https://security.archlinux.org/AVG-2763
reference_id AVG-2763
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2763
7
reference_url https://httpd.apache.org/security/json/CVE-2022-28614.json
reference_id CVE-2022-28614
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-28614.json
8
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
9
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
10
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
11
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
12
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
13
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
14
reference_url https://usn.ubuntu.com/5487-1/
reference_id USN-5487-1
reference_type
scores
url https://usn.ubuntu.com/5487-1/
15
reference_url https://usn.ubuntu.com/5487-3/
reference_id USN-5487-3
reference_type
scores
url https://usn.ubuntu.com/5487-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-28614
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-na94-5565-dyfc
95
url VCID-nb91-camp-eufc
vulnerability_id VCID-nb91-camp-eufc
summary Fix handling of the Require line in mod_lau when a LuaAuthzProvider is used in multiple Require directives with different arguments. This could lead to different authentication rules than expected.
references
0
reference_url http://advisories.mageia.org/MGASA-2015-0011.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2015-0011.html
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159352.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159352.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8109.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8109.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8109
reference_id
reference_type
scores
0
value 0.11719
scoring_system epss
scoring_elements 0.93691
published_at 2026-04-13T12:55:00Z
1
value 0.11719
scoring_system epss
scoring_elements 0.93653
published_at 2026-04-01T12:55:00Z
2
value 0.11719
scoring_system epss
scoring_elements 0.93689
published_at 2026-04-11T12:55:00Z
3
value 0.11719
scoring_system epss
scoring_elements 0.9369
published_at 2026-04-12T12:55:00Z
4
value 0.11719
scoring_system epss
scoring_elements 0.93663
published_at 2026-04-02T12:55:00Z
5
value 0.11719
scoring_system epss
scoring_elements 0.93673
published_at 2026-04-04T12:55:00Z
6
value 0.11719
scoring_system epss
scoring_elements 0.93674
published_at 2026-04-07T12:55:00Z
7
value 0.11719
scoring_system epss
scoring_elements 0.93683
published_at 2026-04-08T12:55:00Z
8
value 0.11719
scoring_system epss
scoring_elements 0.93686
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8109
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109
7
reference_url https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb
reference_id
reference_type
scores
url https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb
8
reference_url https://issues.apache.org/bugzilla/show_bug.cgi?id=57204
reference_id
reference_type
scores
url https://issues.apache.org/bugzilla/show_bug.cgi?id=57204
9
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://support.apple.com/HT205219
reference_id
reference_type
scores
url https://support.apple.com/HT205219
22
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
23
reference_url http://www.openwall.com/lists/oss-security/2014/11/28/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/11/28/5
24
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
25
reference_url http://www.securityfocus.com/bid/73040
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/73040
26
reference_url http://www.ubuntu.com/usn/USN-2523-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2523-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1174077
reference_id 1174077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1174077
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
45
reference_url https://httpd.apache.org/security/json/CVE-2014-8109.json
reference_id CVE-2014-8109
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2014-8109.json
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8109
reference_id CVE-2014-8109
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-8109
47
reference_url https://usn.ubuntu.com/2523-1/
reference_id USN-2523-1
reference_type
scores
url https://usn.ubuntu.com/2523-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2014-8109
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nb91-camp-eufc
96
url VCID-p2a1-afnh-7qca
vulnerability_id VCID-p2a1-afnh-7qca
summary
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism.
This may be used to bypass IP based authentication on the origin server/application.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31813.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31813
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11522
published_at 2026-04-11T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11369
published_at 2026-04-07T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11453
published_at 2026-04-08T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11511
published_at 2026-04-09T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13255
published_at 2026-04-13T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13379
published_at 2026-04-02T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13443
published_at 2026-04-04T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13305
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
reference_id 1012513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2095020
reference_id 2095020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2095020
6
reference_url https://security.archlinux.org/AVG-2763
reference_id AVG-2763
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2763
7
reference_url https://httpd.apache.org/security/json/CVE-2022-31813.json
reference_id CVE-2022-31813
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-31813.json
8
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
9
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
10
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
11
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
12
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
13
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
14
reference_url https://usn.ubuntu.com/5487-1/
reference_id USN-5487-1
reference_type
scores
url https://usn.ubuntu.com/5487-1/
15
reference_url https://usn.ubuntu.com/5487-3/
reference_id USN-5487-3
reference_type
scores
url https://usn.ubuntu.com/5487-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-31813
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2a1-afnh-7qca
97
url VCID-pc2n-ga7g-byga
vulnerability_id VCID-pc2n-ga7g-byga
summary
Apache HTTP Server, prior to release 2.4.25 (and 2.2.32), accepted a broad pattern of unusual whitespace patterns from the user-agent, including bare CR, FF, VTAB in parsing the request line and request header lines, as well as HTAB in parsing the request line. Any bare CR present in request lines was treated as whitespace and remained in the request field member "the_request", while a bare CR in the request header field name would be honored as whitespace, and a bare CR in the request header field value was retained the input headers array. Implied additional whitespace was accepted in the request line and prior to the ':' delimiter of any request header lines.
RFC7230 Section 3.5 calls out some of these whitespace exceptions, and section 3.2.3 eliminated and clarified the role of implied whitespace in the grammer of this specification. Section 3.1.1 requires exactly one single SP between the method and request-target, and between the request-target and HTTP-version, followed immediately by a CRLF sequence. None of these fields permit any (unencoded) CTL character whatsoever. Section 3.2.4 explicitly disallowed any whitespace from the request header field prior to the ':' character, while Section 3.2 disallows all CTL characters in the request header line other than the HTAB character as whitespace.
These defects represent a security concern when httpd is participating in any chain of proxies or interacting with back-end application servers, either through mod_proxy or using conventional CGI mechanisms. In each case where one agent accepts such CTL characters and does not treat them as whitespace, there is the possiblity in a proxy chain of generating two responses from a server behind the uncautious proxy agent. In a sequence of two requests, this results in request A to the first proxy being interpreted as requests A + A' by the backend server, and if requests A and B were submitted to the first proxy in a keepalive connection, the proxy may interpret response A' as the response to request B, polluting the cache or potentially serving the A' content to a different downstream user-agent.
These defects are addressed with the release of Apache HTTP Server 2.4.25 and coordinated by a new directive; HttpProtocolOptions Strict which is the default behavior of 2.4.25 and later.
By toggling from 'Strict' behavior to 'Unsafe' behavior, some of the restrictions may be relaxed to allow some invalid HTTP/1.1 clients to communicate with the server, but this will reintroduce the possibility of the problems described in this assessment. Note that relaxing the behavior to 'Unsafe' will still not permit raw CTLs other than HTAB (where permitted), but will allow other RFC requirements to not be enforced, such as exactly two SP characters in the request line.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8743.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8743
reference_id
reference_type
scores
0
value 0.08406
scoring_system epss
scoring_elements 0.92291
published_at 2026-04-01T12:55:00Z
1
value 0.08406
scoring_system epss
scoring_elements 0.9233
published_at 2026-04-12T12:55:00Z
2
value 0.08406
scoring_system epss
scoring_elements 0.92322
published_at 2026-04-09T12:55:00Z
3
value 0.08406
scoring_system epss
scoring_elements 0.92328
published_at 2026-04-13T12:55:00Z
4
value 0.08406
scoring_system epss
scoring_elements 0.92298
published_at 2026-04-02T12:55:00Z
5
value 0.08406
scoring_system epss
scoring_elements 0.92304
published_at 2026-04-04T12:55:00Z
6
value 0.08406
scoring_system epss
scoring_elements 0.92307
published_at 2026-04-07T12:55:00Z
7
value 0.08406
scoring_system epss
scoring_elements 0.92318
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406822
reference_id 1406822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406822
7
reference_url https://httpd.apache.org/security/json/CVE-2016-8743.json
reference_id CVE-2016-8743
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2016-8743.json
8
reference_url https://security.gentoo.org/glsa/201701-36
reference_id GLSA-201701-36
reference_type
scores
url https://security.gentoo.org/glsa/201701-36
9
reference_url https://access.redhat.com/errata/RHSA-2017:0906
reference_id RHSA-2017:0906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0906
10
reference_url https://access.redhat.com/errata/RHSA-2017:1161
reference_id RHSA-2017:1161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1161
11
reference_url https://access.redhat.com/errata/RHSA-2017:1413
reference_id RHSA-2017:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1413
12
reference_url https://access.redhat.com/errata/RHSA-2017:1414
reference_id RHSA-2017:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1414
13
reference_url https://access.redhat.com/errata/RHSA-2017:1415
reference_id RHSA-2017:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1415
14
reference_url https://access.redhat.com/errata/RHSA-2017:1721
reference_id RHSA-2017:1721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1721
15
reference_url https://usn.ubuntu.com/3279-1/
reference_id USN-3279-1
reference_type
scores
url https://usn.ubuntu.com/3279-1/
16
reference_url https://usn.ubuntu.com/3373-1/
reference_id USN-3373-1
reference_type
scores
url https://usn.ubuntu.com/3373-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2016-8743
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pc2n-ga7g-byga
98
url VCID-pjxs-hnjr-duey
vulnerability_id VCID-pjxs-hnjr-duey
summary
null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38477.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38477.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38477
reference_id
reference_type
scores
0
value 0.01148
scoring_system epss
scoring_elements 0.78479
published_at 2026-04-12T12:55:00Z
1
value 0.01148
scoring_system epss
scoring_elements 0.78472
published_at 2026-04-13T12:55:00Z
2
value 0.01148
scoring_system epss
scoring_elements 0.78498
published_at 2026-04-11T12:55:00Z
3
value 0.01347
scoring_system epss
scoring_elements 0.80057
published_at 2026-04-04T12:55:00Z
4
value 0.01347
scoring_system epss
scoring_elements 0.80036
published_at 2026-04-02T12:55:00Z
5
value 0.01347
scoring_system epss
scoring_elements 0.80046
published_at 2026-04-07T12:55:00Z
6
value 0.01347
scoring_system epss
scoring_elements 0.80075
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38477
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295016
reference_id 2295016
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295016
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38477.json
reference_id CVE-2024-38477
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38477.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:23:13Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:4719
reference_id RHSA-2024:4719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4719
15
reference_url https://access.redhat.com/errata/RHSA-2024:4720
reference_id RHSA-2024:4720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4720
16
reference_url https://access.redhat.com/errata/RHSA-2024:4726
reference_id RHSA-2024:4726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4726
17
reference_url https://access.redhat.com/errata/RHSA-2024:4820
reference_id RHSA-2024:4820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4820
18
reference_url https://access.redhat.com/errata/RHSA-2024:4827
reference_id RHSA-2024:4827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4827
19
reference_url https://access.redhat.com/errata/RHSA-2024:4830
reference_id RHSA-2024:4830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4830
20
reference_url https://access.redhat.com/errata/RHSA-2024:4862
reference_id RHSA-2024:4862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4862
21
reference_url https://access.redhat.com/errata/RHSA-2024:4863
reference_id RHSA-2024:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4863
22
reference_url https://access.redhat.com/errata/RHSA-2024:4938
reference_id RHSA-2024:4938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4938
23
reference_url https://access.redhat.com/errata/RHSA-2024:4943
reference_id RHSA-2024:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4943
24
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
25
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
26
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
27
reference_url https://usn.ubuntu.com/6885-3/
reference_id USN-6885-3
reference_type
scores
url https://usn.ubuntu.com/6885-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-38477
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pjxs-hnjr-duey
99
url VCID-pnc8-bb23-vqh1
vulnerability_id VCID-pnc8-bb23-vqh1
summary
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash.

This issue affects Apache HTTP Server 2.4.52 and earlier.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22719.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22719
reference_id
reference_type
scores
0
value 0.29312
scoring_system epss
scoring_elements 0.96593
published_at 2026-04-11T12:55:00Z
1
value 0.29312
scoring_system epss
scoring_elements 0.96591
published_at 2026-04-09T12:55:00Z
2
value 0.29312
scoring_system epss
scoring_elements 0.96578
published_at 2026-04-04T12:55:00Z
3
value 0.29312
scoring_system epss
scoring_elements 0.96581
published_at 2026-04-07T12:55:00Z
4
value 0.29312
scoring_system epss
scoring_elements 0.96589
published_at 2026-04-08T12:55:00Z
5
value 0.29312
scoring_system epss
scoring_elements 0.96573
published_at 2026-04-02T12:55:00Z
6
value 0.29423
scoring_system epss
scoring_elements 0.96602
published_at 2026-04-13T12:55:00Z
7
value 0.29423
scoring_system epss
scoring_elements 0.96599
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064322
reference_id 2064322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064322
5
reference_url https://httpd.apache.org/security/json/CVE-2022-22719.json
reference_id CVE-2022-22719
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-22719.json
6
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
7
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
8
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
9
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
10
reference_url https://usn.ubuntu.com/5333-1/
reference_id USN-5333-1
reference_type
scores
url https://usn.ubuntu.com/5333-1/
11
reference_url https://usn.ubuntu.com/5333-2/
reference_id USN-5333-2
reference_type
scores
url https://usn.ubuntu.com/5333-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-22719
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pnc8-bb23-vqh1
100
url VCID-prd8-51a5-pygj
vulnerability_id VCID-prd8-51a5-pygj
summary
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released.
Patches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
reference_id
reference_type
scores
0
value 0.79136
scoring_system epss
scoring_elements 0.99065
published_at 2026-04-13T12:55:00Z
1
value 0.79136
scoring_system epss
scoring_elements 0.99054
published_at 2026-04-01T12:55:00Z
2
value 0.79136
scoring_system epss
scoring_elements 0.99055
published_at 2026-04-02T12:55:00Z
3
value 0.79136
scoring_system epss
scoring_elements 0.99059
published_at 2026-04-04T12:55:00Z
4
value 0.79136
scoring_system epss
scoring_elements 0.99062
published_at 2026-04-07T12:55:00Z
5
value 0.79136
scoring_system epss
scoring_elements 0.99063
published_at 2026-04-08T12:55:00Z
6
value 0.79136
scoring_system epss
scoring_elements 0.99064
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=740045
reference_id 740045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=740045
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3368.json
reference_id CVE-2011-3368
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3368.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
reference_id CVE-2011-3368;OSVDB-76079
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
6
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
7
reference_url https://access.redhat.com/errata/RHSA-2011:1391
reference_id RHSA-2011:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1391
8
reference_url https://access.redhat.com/errata/RHSA-2011:1392
reference_id RHSA-2011:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1392
9
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
10
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
11
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2011-3368
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prd8-51a5-pygj
101
url VCID-pz6f-mahv-hue8
vulnerability_id VCID-pz6f-mahv-hue8
summary
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.

Users are recommended to upgrade to version 2.4.61, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39884.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39884
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47857
published_at 2026-04-13T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.47828
published_at 2026-04-02T12:55:00Z
2
value 0.00246
scoring_system epss
scoring_elements 0.4785
published_at 2026-04-04T12:55:00Z
3
value 0.00246
scoring_system epss
scoring_elements 0.47799
published_at 2026-04-07T12:55:00Z
4
value 0.00246
scoring_system epss
scoring_elements 0.47851
published_at 2026-04-08T12:55:00Z
5
value 0.00246
scoring_system epss
scoring_elements 0.47847
published_at 2026-04-12T12:55:00Z
6
value 0.00246
scoring_system epss
scoring_elements 0.47871
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39884
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39884
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295761
reference_id 2295761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295761
5
reference_url http://www.openwall.com/lists/oss-security/2024/07/17/6
reference_id 6
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T13:54:22Z/
url http://www.openwall.com/lists/oss-security/2024/07/17/6
6
reference_url https://httpd.apache.org/security/json/CVE-2024-39884.json
reference_id CVE-2024-39884
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-39884.json
7
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
8
reference_url https://security.netapp.com/advisory/ntap-20240712-0002/
reference_id ntap-20240712-0002
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-05T13:54:22Z/
url https://security.netapp.com/advisory/ntap-20240712-0002/
9
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-39884
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pz6f-mahv-hue8
102
url VCID-q5wm-suxb-jfeb
vulnerability_id VCID-q5wm-suxb-jfeb
summary The expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15715.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15715
reference_id
reference_type
scores
0
value 0.94103
scoring_system epss
scoring_elements 0.99909
published_at 2026-04-13T12:55:00Z
1
value 0.94103
scoring_system epss
scoring_elements 0.99907
published_at 2026-04-08T12:55:00Z
2
value 0.94103
scoring_system epss
scoring_elements 0.99908
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560614
reference_id 1560614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560614
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2017-15715.json
reference_id CVE-2017-15715
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-15715.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-15715
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5wm-suxb-jfeb
103
url VCID-qayj-kts9-3fde
vulnerability_id VCID-qayj-kts9-3fde
summary Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. Third-party module writers SHOULD use ap_get_basic_auth_components(), available in 2.2.34 and 2.4.26, instead of ap_get_basic_auth_pw(). Modules which call the legacy ap_get_basic_auth_pw() during the authentication phase MUST either immediately authenticate the user after the call, or else stop the request immediately with an error response, to avoid incorrectly authenticating the current request.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3167.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3167.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3167
reference_id
reference_type
scores
0
value 0.10349
scoring_system epss
scoring_elements 0.93162
published_at 2026-04-01T12:55:00Z
1
value 0.10349
scoring_system epss
scoring_elements 0.93191
published_at 2026-04-13T12:55:00Z
2
value 0.10349
scoring_system epss
scoring_elements 0.93183
published_at 2026-04-08T12:55:00Z
3
value 0.10349
scoring_system epss
scoring_elements 0.93187
published_at 2026-04-09T12:55:00Z
4
value 0.10349
scoring_system epss
scoring_elements 0.93192
published_at 2026-04-11T12:55:00Z
5
value 0.10349
scoring_system epss
scoring_elements 0.9319
published_at 2026-04-12T12:55:00Z
6
value 0.10349
scoring_system epss
scoring_elements 0.93172
published_at 2026-04-02T12:55:00Z
7
value 0.10349
scoring_system epss
scoring_elements 0.93176
published_at 2026-04-04T12:55:00Z
8
value 0.10349
scoring_system epss
scoring_elements 0.93174
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3167
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1463194
reference_id 1463194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1463194
8
reference_url https://security.archlinux.org/ASA-201706-34
reference_id ASA-201706-34
reference_type
scores
url https://security.archlinux.org/ASA-201706-34
9
reference_url https://security.archlinux.org/AVG-316
reference_id AVG-316
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-316
10
reference_url https://httpd.apache.org/security/json/CVE-2017-3167.json
reference_id CVE-2017-3167
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-3167.json
11
reference_url https://security.gentoo.org/glsa/201710-32
reference_id GLSA-201710-32
reference_type
scores
url https://security.gentoo.org/glsa/201710-32
12
reference_url https://access.redhat.com/errata/RHSA-2017:2478
reference_id RHSA-2017:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2478
13
reference_url https://access.redhat.com/errata/RHSA-2017:2479
reference_id RHSA-2017:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2479
14
reference_url https://access.redhat.com/errata/RHSA-2017:2483
reference_id RHSA-2017:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2483
15
reference_url https://access.redhat.com/errata/RHSA-2017:3193
reference_id RHSA-2017:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3193
16
reference_url https://access.redhat.com/errata/RHSA-2017:3194
reference_id RHSA-2017:3194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3194
17
reference_url https://access.redhat.com/errata/RHSA-2017:3195
reference_id RHSA-2017:3195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3195
18
reference_url https://access.redhat.com/errata/RHSA-2017:3475
reference_id RHSA-2017:3475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3475
19
reference_url https://access.redhat.com/errata/RHSA-2017:3476
reference_id RHSA-2017:3476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3476
20
reference_url https://access.redhat.com/errata/RHSA-2017:3477
reference_id RHSA-2017:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3477
21
reference_url https://usn.ubuntu.com/3340-1/
reference_id USN-3340-1
reference_type
scores
url https://usn.ubuntu.com/3340-1/
22
reference_url https://usn.ubuntu.com/3373-1/
reference_id USN-3373-1
reference_type
scores
url https://usn.ubuntu.com/3373-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-3167
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qayj-kts9-3fde
104
url VCID-qc9j-x576-ayc1
vulnerability_id VCID-qc9j-x576-ayc1
summary By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8011.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8011
reference_id
reference_type
scores
0
value 0.8201
scoring_system epss
scoring_elements 0.99199
published_at 2026-04-01T12:55:00Z
1
value 0.8201
scoring_system epss
scoring_elements 0.99201
published_at 2026-04-02T12:55:00Z
2
value 0.8201
scoring_system epss
scoring_elements 0.99208
published_at 2026-04-09T12:55:00Z
3
value 0.8201
scoring_system epss
scoring_elements 0.99207
published_at 2026-04-13T12:55:00Z
4
value 0.8201
scoring_system epss
scoring_elements 0.99203
published_at 2026-04-04T12:55:00Z
5
value 0.8201
scoring_system epss
scoring_elements 0.99209
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8011
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-8011
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-8011
5
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://security.netapp.com/advisory/ntap-20180926-0007/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0007/
18
reference_url http://www.securitytracker.com/id/1041401
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041401
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1605052
reference_id 1605052
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1605052
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904107
reference_id 904107
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904107
21
reference_url https://security.archlinux.org/ASA-201807-12
reference_id ASA-201807-12
reference_type
scores
url https://security.archlinux.org/ASA-201807-12
22
reference_url https://security.archlinux.org/AVG-736
reference_id AVG-736
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-736
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
25
reference_url https://httpd.apache.org/security/json/CVE-2018-8011.json
reference_id CVE-2018-8011
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-8011.json
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8011
reference_id CVE-2018-8011
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-8011
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-8011
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qc9j-x576-ayc1
105
url VCID-qjeh-n57t-y7g5
vulnerability_id VCID-qjeh-n57t-y7g5
summary
A partial fix for  CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.

Users are recommended to upgrade to version 2.4.62, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40725.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40725
reference_id
reference_type
scores
0
value 0.25097
scoring_system epss
scoring_elements 0.96177
published_at 2026-04-13T12:55:00Z
1
value 0.25097
scoring_system epss
scoring_elements 0.96159
published_at 2026-04-07T12:55:00Z
2
value 0.25097
scoring_system epss
scoring_elements 0.96169
published_at 2026-04-08T12:55:00Z
3
value 0.25097
scoring_system epss
scoring_elements 0.96173
published_at 2026-04-09T12:55:00Z
4
value 0.25097
scoring_system epss
scoring_elements 0.96175
published_at 2026-04-12T12:55:00Z
5
value 0.25097
scoring_system epss
scoring_elements 0.96154
published_at 2026-04-04T12:55:00Z
6
value 0.26567
scoring_system epss
scoring_elements 0.96301
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40725
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40725
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297362
reference_id 2297362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2297362
5
reference_url https://httpd.apache.org/security/json/CVE-2024-40725.json
reference_id CVE-2024-40725
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-40725.json
6
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
7
reference_url https://usn.ubuntu.com/6902-1/
reference_id USN-6902-1
reference_type
scores
url https://usn.ubuntu.com/6902-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-40725
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjeh-n57t-y7g5
106
url VCID-qm7e-n9ay-hufy
vulnerability_id VCID-qm7e-n9ay-hufy
summary Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26377.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26377
reference_id
reference_type
scores
0
value 0.39296
scoring_system epss
scoring_elements 0.97289
published_at 2026-04-13T12:55:00Z
1
value 0.39296
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-11T12:55:00Z
2
value 0.39296
scoring_system epss
scoring_elements 0.97288
published_at 2026-04-12T12:55:00Z
3
value 0.3988
scoring_system epss
scoring_elements 0.97321
published_at 2026-04-09T12:55:00Z
4
value 0.3988
scoring_system epss
scoring_elements 0.97314
published_at 2026-04-07T12:55:00Z
5
value 0.3988
scoring_system epss
scoring_elements 0.97308
published_at 2026-04-02T12:55:00Z
6
value 0.3988
scoring_system epss
scoring_elements 0.97313
published_at 2026-04-04T12:55:00Z
7
value 0.3988
scoring_system epss
scoring_elements 0.9732
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
reference_id 1012513
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012513
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2094997
reference_id 2094997
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2094997
6
reference_url https://security.archlinux.org/AVG-2763
reference_id AVG-2763
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2763
7
reference_url https://httpd.apache.org/security/json/CVE-2022-26377.json
reference_id CVE-2022-26377
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-26377.json
8
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
9
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
10
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
11
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
12
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
13
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
14
reference_url https://usn.ubuntu.com/5487-1/
reference_id USN-5487-1
reference_type
scores
url https://usn.ubuntu.com/5487-1/
15
reference_url https://usn.ubuntu.com/5487-3/
reference_id USN-5487-3
reference_type
scores
url https://usn.ubuntu.com/5487-3/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-26377
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qm7e-n9ay-hufy
107
url VCID-r2pc-wuzb-h7hk
vulnerability_id VCID-r2pc-wuzb-h7hk
summary Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36387.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36387
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.3415
published_at 2026-04-13T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34143
published_at 2026-04-07T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34186
published_at 2026-04-08T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34215
published_at 2026-04-09T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34216
published_at 2026-04-11T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34173
published_at 2026-04-12T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34247
published_at 2026-04-02T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.3428
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36387
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295006
reference_id 2295006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295006
11
reference_url https://httpd.apache.org/security/json/CVE-2024-36387.json
reference_id CVE-2024-36387
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-36387.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:22:03Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:8680
reference_id RHSA-2024:8680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8680
15
reference_url https://access.redhat.com/errata/RHSA-2025:3452
reference_id RHSA-2025:3452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3452
16
reference_url https://access.redhat.com/errata/RHSA-2025:3453
reference_id RHSA-2025:3453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3453
17
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2024-36387
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r2pc-wuzb-h7hk
108
url VCID-r471-g9xs-sbga
vulnerability_id VCID-r471-g9xs-sbga
summary
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23048.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-23048
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09386
published_at 2026-04-13T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09416
published_at 2026-04-09T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0943
published_at 2026-04-11T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.094
published_at 2026-04-12T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09071
published_at 2026-04-02T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09124
published_at 2026-04-04T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09292
published_at 2026-04-07T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09368
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-23048
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23048
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374576
reference_id 2374576
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374576
5
reference_url https://httpd.apache.org/security/json/CVE-2025-23048.json
reference_id CVE-2025-23048
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-23048.json
6
reference_url https://access.redhat.com/errata/RHSA-2025:13680
reference_id RHSA-2025:13680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13680
7
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
8
reference_url https://access.redhat.com/errata/RHSA-2025:14901
reference_id RHSA-2025:14901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14901
9
reference_url https://access.redhat.com/errata/RHSA-2025:14902
reference_id RHSA-2025:14902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14902
10
reference_url https://access.redhat.com/errata/RHSA-2025:14903
reference_id RHSA-2025:14903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14903
11
reference_url https://access.redhat.com/errata/RHSA-2025:15023
reference_id RHSA-2025:15023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15023
12
reference_url https://access.redhat.com/errata/RHSA-2025:15095
reference_id RHSA-2025:15095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15095
13
reference_url https://access.redhat.com/errata/RHSA-2025:15123
reference_id RHSA-2025:15123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15123
14
reference_url https://access.redhat.com/errata/RHSA-2025:15516
reference_id RHSA-2025:15516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15516
15
reference_url https://access.redhat.com/errata/RHSA-2025:15619
reference_id RHSA-2025:15619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15619
16
reference_url https://access.redhat.com/errata/RHSA-2025:15684
reference_id RHSA-2025:15684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15684
17
reference_url https://access.redhat.com/errata/RHSA-2025:15698
reference_id RHSA-2025:15698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15698
18
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
19
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-23048
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r471-g9xs-sbga
109
url VCID-rdtq-8ng5-53fn
vulnerability_id VCID-rdtq-8ng5-53fn
summary
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS).

This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36160.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36160.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36160
reference_id
reference_type
scores
0
value 0.03716
scoring_system epss
scoring_elements 0.8792
published_at 2026-04-01T12:55:00Z
1
value 0.03716
scoring_system epss
scoring_elements 0.87977
published_at 2026-04-13T12:55:00Z
2
value 0.03716
scoring_system epss
scoring_elements 0.87974
published_at 2026-04-09T12:55:00Z
3
value 0.03716
scoring_system epss
scoring_elements 0.87985
published_at 2026-04-11T12:55:00Z
4
value 0.03716
scoring_system epss
scoring_elements 0.87978
published_at 2026-04-12T12:55:00Z
5
value 0.03716
scoring_system epss
scoring_elements 0.8793
published_at 2026-04-02T12:55:00Z
6
value 0.03716
scoring_system epss
scoring_elements 0.87943
published_at 2026-04-04T12:55:00Z
7
value 0.03716
scoring_system epss
scoring_elements 0.87947
published_at 2026-04-07T12:55:00Z
8
value 0.03716
scoring_system epss
scoring_elements 0.87968
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36160
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2005124
reference_id 2005124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2005124
8
reference_url https://security.archlinux.org/AVG-2289
reference_id AVG-2289
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2289
9
reference_url https://httpd.apache.org/security/json/CVE-2021-36160.json
reference_id CVE-2021-36160
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-36160.json
10
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
11
reference_url https://access.redhat.com/errata/RHSA-2022:1915
reference_id RHSA-2022:1915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1915
12
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
13
reference_url https://access.redhat.com/errata/RHSA-2022:7143
reference_id RHSA-2022:7143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7143
14
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
15
reference_url https://usn.ubuntu.com/5090-1/
reference_id USN-5090-1
reference_type
scores
url https://usn.ubuntu.com/5090-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-36160
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rdtq-8ng5-53fn
110
url VCID-rfqy-e7pv-dyfy
vulnerability_id VCID-rfqy-e7pv-dyfy
summary Malicious input to mod_auth_digest will cause the server to crash, and each instance continues to crash even for subsequently valid requests.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2161.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2161
reference_id
reference_type
scores
0
value 0.33186
scoring_system epss
scoring_elements 0.96873
published_at 2026-04-01T12:55:00Z
1
value 0.33186
scoring_system epss
scoring_elements 0.96905
published_at 2026-04-13T12:55:00Z
2
value 0.33186
scoring_system epss
scoring_elements 0.96902
published_at 2026-04-11T12:55:00Z
3
value 0.33186
scoring_system epss
scoring_elements 0.96904
published_at 2026-04-12T12:55:00Z
4
value 0.33186
scoring_system epss
scoring_elements 0.9688
published_at 2026-04-02T12:55:00Z
5
value 0.33186
scoring_system epss
scoring_elements 0.96885
published_at 2026-04-04T12:55:00Z
6
value 0.33186
scoring_system epss
scoring_elements 0.9689
published_at 2026-04-07T12:55:00Z
7
value 0.33186
scoring_system epss
scoring_elements 0.96898
published_at 2026-04-08T12:55:00Z
8
value 0.33186
scoring_system epss
scoring_elements 0.96899
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406753
reference_id 1406753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406753
7
reference_url https://httpd.apache.org/security/json/CVE-2016-2161.json
reference_id CVE-2016-2161
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2016-2161.json
8
reference_url https://security.gentoo.org/glsa/201701-36
reference_id GLSA-201701-36
reference_type
scores
url https://security.gentoo.org/glsa/201701-36
9
reference_url https://access.redhat.com/errata/RHSA-2017:0906
reference_id RHSA-2017:0906
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0906
10
reference_url https://access.redhat.com/errata/RHSA-2017:1161
reference_id RHSA-2017:1161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1161
11
reference_url https://access.redhat.com/errata/RHSA-2017:1413
reference_id RHSA-2017:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1413
12
reference_url https://access.redhat.com/errata/RHSA-2017:1414
reference_id RHSA-2017:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1414
13
reference_url https://access.redhat.com/errata/RHSA-2017:1415
reference_id RHSA-2017:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1415
14
reference_url https://usn.ubuntu.com/3279-1/
reference_id USN-3279-1
reference_type
scores
url https://usn.ubuntu.com/3279-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2016-2161
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rfqy-e7pv-dyfy
111
url VCID-rhk3-ujc1-q7fj
vulnerability_id VCID-rhk3-ujc1-q7fj
summary Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_22.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html
1
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
2
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101196.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101196.html
4
reference_url http://marc.info/?l=bugtraq&m=136612293908376&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136612293908376&w=2
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-0815.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0815.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1207.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1207.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2013-1208.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1208.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2013-1209.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1209.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3499.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3499.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3499
reference_id
reference_type
scores
0
value 0.10341
scoring_system epss
scoring_elements 0.93186
published_at 2026-04-12T12:55:00Z
1
value 0.10341
scoring_system epss
scoring_elements 0.93158
published_at 2026-04-01T12:55:00Z
2
value 0.10341
scoring_system epss
scoring_elements 0.93183
published_at 2026-04-09T12:55:00Z
3
value 0.10341
scoring_system epss
scoring_elements 0.93188
published_at 2026-04-13T12:55:00Z
4
value 0.10341
scoring_system epss
scoring_elements 0.93168
published_at 2026-04-02T12:55:00Z
5
value 0.10341
scoring_system epss
scoring_elements 0.93172
published_at 2026-04-04T12:55:00Z
6
value 0.10341
scoring_system epss
scoring_elements 0.9317
published_at 2026-04-07T12:55:00Z
7
value 0.10341
scoring_system epss
scoring_elements 0.93179
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3499
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499
12
reference_url http://secunia.com/advisories/55032
reference_id
reference_type
scores
url http://secunia.com/advisories/55032
13
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19312
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19312
31
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
32
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_info.c?r1=1225799&r2=1413732&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_info.c?r1=1225799&r2=1413732&diff_format=h
33
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1389564&r2=1413732&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1389564&r2=1413732&diff_format=h
34
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/ldap/util_ldap_cache_mgr.c?r1=1209766&r2=1418752&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/ldap/util_ldap_cache_mgr.c?r1=1209766&r2=1418752&diff_format=h
35
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/mappers/mod_imagemap.c?r1=1398480&r2=1413732&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/mappers/mod_imagemap.c?r1=1398480&r2=1413732&diff_format=h
36
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_ftp.c?r1=1404625&r2=1413732&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_ftp.c?r1=1404625&r2=1413732&diff_format=h
37
reference_url http://www.debian.org/security/2013/dsa-2637
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2637
38
reference_url http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
reference_id
reference_type
scores
url http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
39
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
40
reference_url http://www.securityfocus.com/bid/58165
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58165
41
reference_url http://www.securityfocus.com/bid/64758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/64758
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=915883
reference_id 915883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=915883
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
70
reference_url https://httpd.apache.org/security/json/CVE-2012-3499.json
reference_id CVE-2012-3499
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-3499.json
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3499
reference_id CVE-2012-3499
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3499
72
reference_url https://access.redhat.com/errata/RHSA-2013:0815
reference_id RHSA-2013:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0815
73
reference_url https://access.redhat.com/errata/RHSA-2013:1011
reference_id RHSA-2013:1011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1011
74
reference_url https://access.redhat.com/errata/RHSA-2013:1012
reference_id RHSA-2013:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1012
75
reference_url https://access.redhat.com/errata/RHSA-2013:1013
reference_id RHSA-2013:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1013
76
reference_url https://access.redhat.com/errata/RHSA-2013:1207
reference_id RHSA-2013:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1207
77
reference_url https://access.redhat.com/errata/RHSA-2013:1208
reference_id RHSA-2013:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1208
78
reference_url https://access.redhat.com/errata/RHSA-2013:1209
reference_id RHSA-2013:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1209
79
reference_url https://usn.ubuntu.com/1765-1/
reference_id USN-1765-1
reference_type
scores
url https://usn.ubuntu.com/1765-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-3499
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhk3-ujc1-q7fj
112
url VCID-scf1-zmu7-e3b2
vulnerability_id VCID-scf1-zmu7-e3b2
summary A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.33 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1303.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1303.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1303
reference_id
reference_type
scores
0
value 0.40137
scoring_system epss
scoring_elements 0.97315
published_at 2026-04-01T12:55:00Z
1
value 0.40137
scoring_system epss
scoring_elements 0.97337
published_at 2026-04-13T12:55:00Z
2
value 0.40137
scoring_system epss
scoring_elements 0.97333
published_at 2026-04-09T12:55:00Z
3
value 0.40137
scoring_system epss
scoring_elements 0.97335
published_at 2026-04-11T12:55:00Z
4
value 0.40137
scoring_system epss
scoring_elements 0.97336
published_at 2026-04-12T12:55:00Z
5
value 0.40137
scoring_system epss
scoring_elements 0.97321
published_at 2026-04-02T12:55:00Z
6
value 0.40137
scoring_system epss
scoring_elements 0.97325
published_at 2026-04-04T12:55:00Z
7
value 0.40137
scoring_system epss
scoring_elements 0.97326
published_at 2026-04-07T12:55:00Z
8
value 0.40137
scoring_system epss
scoring_elements 0.97332
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1303
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560399
reference_id 1560399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560399
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2018-1303.json
reference_id CVE-2018-1303
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1303.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2018-1303
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-scf1-zmu7-e3b2
113
url VCID-ssvj-7g27-1ug6
vulnerability_id VCID-ssvj-7g27-1ug6
summary A XSS flaw affected the mod_proxy_balancer manager interface.
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_22.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html
1
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
2
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101196.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101196.html
4
reference_url http://marc.info/?l=bugtraq&m=136612293908376&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136612293908376&w=2
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-0815.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0815.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1207.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1207.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2013-1208.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1208.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2013-1209.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1209.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4558.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4558.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4558
reference_id
reference_type
scores
0
value 0.28235
scoring_system epss
scoring_elements 0.96502
published_at 2026-04-13T12:55:00Z
1
value 0.28235
scoring_system epss
scoring_elements 0.96466
published_at 2026-04-01T12:55:00Z
2
value 0.28235
scoring_system epss
scoring_elements 0.96495
published_at 2026-04-09T12:55:00Z
3
value 0.28235
scoring_system epss
scoring_elements 0.96499
published_at 2026-04-12T12:55:00Z
4
value 0.28235
scoring_system epss
scoring_elements 0.96475
published_at 2026-04-02T12:55:00Z
5
value 0.28235
scoring_system epss
scoring_elements 0.9648
published_at 2026-04-04T12:55:00Z
6
value 0.28235
scoring_system epss
scoring_elements 0.96484
published_at 2026-04-07T12:55:00Z
7
value 0.28235
scoring_system epss
scoring_elements 0.96492
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4558
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558
12
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18977
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18977
33
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
34
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_balancer.c?r1=1404653&r2=1413732&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_balancer.c?r1=1404653&r2=1413732&diff_format=h
35
reference_url http://www.debian.org/security/2013/dsa-2637
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2637
36
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
37
reference_url http://www.securityfocus.com/bid/58165
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58165
38
reference_url http://www.securityfocus.com/bid/64758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/64758
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=915884
reference_id 915884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=915884
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
67
reference_url https://httpd.apache.org/security/json/CVE-2012-4558.json
reference_id CVE-2012-4558
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-4558.json
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4558
reference_id CVE-2012-4558
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4558
69
reference_url https://access.redhat.com/errata/RHSA-2013:0815
reference_id RHSA-2013:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0815
70
reference_url https://access.redhat.com/errata/RHSA-2013:1011
reference_id RHSA-2013:1011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1011
71
reference_url https://access.redhat.com/errata/RHSA-2013:1012
reference_id RHSA-2013:1012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1012
72
reference_url https://access.redhat.com/errata/RHSA-2013:1013
reference_id RHSA-2013:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1013
73
reference_url https://access.redhat.com/errata/RHSA-2013:1207
reference_id RHSA-2013:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1207
74
reference_url https://access.redhat.com/errata/RHSA-2013:1208
reference_id RHSA-2013:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1208
75
reference_url https://access.redhat.com/errata/RHSA-2013:1209
reference_id RHSA-2013:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1209
76
reference_url https://usn.ubuntu.com/1765-1/
reference_id USN-1765-1
reference_type
scores
url https://usn.ubuntu.com/1765-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-4558
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssvj-7g27-1ug6
114
url VCID-t67v-c4gx-ukbj
vulnerability_id VCID-t67v-c4gx-ukbj
summary In Apache HTTP Server versions 2.4.32 to 2.4.43, mod_proxy_uwsgi has a information disclosure and possible RCE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11984.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11984.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11984
reference_id
reference_type
scores
0
value 0.75348
scoring_system epss
scoring_elements 0.98877
published_at 2026-04-01T12:55:00Z
1
value 0.75348
scoring_system epss
scoring_elements 0.98887
published_at 2026-04-13T12:55:00Z
2
value 0.75348
scoring_system epss
scoring_elements 0.98885
published_at 2026-04-08T12:55:00Z
3
value 0.75348
scoring_system epss
scoring_elements 0.98886
published_at 2026-04-12T12:55:00Z
4
value 0.75348
scoring_system epss
scoring_elements 0.98879
published_at 2026-04-02T12:55:00Z
5
value 0.75348
scoring_system epss
scoring_elements 0.98881
published_at 2026-04-04T12:55:00Z
6
value 0.75348
scoring_system epss
scoring_elements 0.98883
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11984
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1866563
reference_id 1866563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1866563
9
reference_url https://httpd.apache.org/security/json/CVE-2020-11984.json
reference_id CVE-2020-11984
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2020-11984.json
10
reference_url https://security.gentoo.org/glsa/202008-04
reference_id GLSA-202008-04
reference_type
scores
url https://security.gentoo.org/glsa/202008-04
11
reference_url https://access.redhat.com/errata/RHSA-2020:4383
reference_id RHSA-2020:4383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4383
12
reference_url https://access.redhat.com/errata/RHSA-2020:4384
reference_id RHSA-2020:4384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4384
13
reference_url https://access.redhat.com/errata/RHSA-2021:1809
reference_id RHSA-2021:1809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1809
14
reference_url https://usn.ubuntu.com/4458-1/
reference_id USN-4458-1
reference_type
scores
url https://usn.ubuntu.com/4458-1/
15
reference_url https://usn.ubuntu.com/5054-1/
reference_id USN-5054-1
reference_type
scores
url https://usn.ubuntu.com/5054-1/
16
reference_url https://usn.ubuntu.com/USN-5054-2/
reference_id USN-USN-5054-2
reference_type
scores
url https://usn.ubuntu.com/USN-5054-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2020-11984
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t67v-c4gx-ukbj
115
url VCID-tbud-pwyt-aye9
vulnerability_id VCID-tbud-pwyt-aye9
summary A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page.
references
0
reference_url http://advisories.mageia.org/MGASA-2014-0304.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0304.html
1
reference_url http://advisories.mageia.org/MGASA-2014-0305.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0305.html
2
reference_url http://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_24.html
3
reference_url http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
4
reference_url http://marc.info/?l=bugtraq&m=143403519711434&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143403519711434&w=2
5
reference_url http://marc.info/?l=bugtraq&m=143748090628601&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143748090628601&w=2
6
reference_url http://marc.info/?l=bugtraq&m=144050155601375&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144050155601375&w=2
7
reference_url http://marc.info/?l=bugtraq&m=144493176821532&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144493176821532&w=2
8
reference_url http://rhn.redhat.com/errata/RHSA-2014-1019.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1019.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2014-1020.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1020.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2014-1021.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1021.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0226.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0226.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0226
reference_id
reference_type
scores
0
value 0.75444
scoring_system epss
scoring_elements 0.98892
published_at 2026-04-13T12:55:00Z
1
value 0.75444
scoring_system epss
scoring_elements 0.98882
published_at 2026-04-01T12:55:00Z
2
value 0.75444
scoring_system epss
scoring_elements 0.98889
published_at 2026-04-08T12:55:00Z
3
value 0.75444
scoring_system epss
scoring_elements 0.98891
published_at 2026-04-12T12:55:00Z
4
value 0.75444
scoring_system epss
scoring_elements 0.98884
published_at 2026-04-02T12:55:00Z
5
value 0.75444
scoring_system epss
scoring_elements 0.98885
published_at 2026-04-04T12:55:00Z
6
value 0.75444
scoring_system epss
scoring_elements 0.98888
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0226
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
16
reference_url http://seclists.org/fulldisclosure/2014/Jul/114
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Jul/114
17
reference_url http://secunia.com/advisories/60536
reference_id
reference_type
scores
url http://secunia.com/advisories/60536
18
reference_url http://security.gentoo.org/glsa/glsa-201408-12.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201408-12.xml
19
reference_url https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
reference_id
reference_type
scores
url https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
20
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
37
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
38
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
39
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
40
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
41
reference_url https://puppet.com/security/cve/cve-2014-0226
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2014-0226
42
reference_url https://support.apple.com/HT204659
reference_id
reference_type
scores
url https://support.apple.com/HT204659
43
reference_url http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
reference_id
reference_type
scores
url http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
44
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c
45
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1450998&r2=1610491&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1450998&r2=1610491&diff_format=h
46
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c
47
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c?r1=1588989&r2=1610491&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c?r1=1588989&r2=1610491&diff_format=h
48
reference_url https://www.povonsec.com/apache-2-4-7-exploit/
reference_id
reference_type
scores
url https://www.povonsec.com/apache-2-4-7-exploit/
49
reference_url http://www.debian.org/security/2014/dsa-2989
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-2989
50
reference_url http://www.exploit-db.com/exploits/34133
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/34133
51
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:142
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:142
52
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
53
reference_url http://www.osvdb.org/109216
reference_id
reference_type
scores
url http://www.osvdb.org/109216
54
reference_url http://www.securityfocus.com/bid/68678
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68678
55
reference_url http://zerodayinitiative.com/advisories/ZDI-14-236/
reference_id
reference_type
scores
url http://zerodayinitiative.com/advisories/ZDI-14-236/
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1120603
reference_id 1120603
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1120603
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:4.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.63:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
74
reference_url https://httpd.apache.org/security/json/CVE-2014-0226.json
reference_id CVE-2014-0226
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2014-0226.json
75
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0226
reference_id CVE-2014-0226
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-0226
76
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/34133.txt
reference_id CVE-2014-0226;OSVDB-109216
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/34133.txt
77
reference_url https://security.gentoo.org/glsa/201408-12
reference_id GLSA-201408-12
reference_type
scores
url https://security.gentoo.org/glsa/201408-12
78
reference_url https://security.gentoo.org/glsa/201504-03
reference_id GLSA-201504-03
reference_type
scores
url https://security.gentoo.org/glsa/201504-03
79
reference_url https://access.redhat.com/errata/RHSA-2014:0920
reference_id RHSA-2014:0920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0920
80
reference_url https://access.redhat.com/errata/RHSA-2014:0921
reference_id RHSA-2014:0921
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0921
81
reference_url https://access.redhat.com/errata/RHSA-2014:0922
reference_id RHSA-2014:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0922
82
reference_url https://access.redhat.com/errata/RHSA-2014:1019
reference_id RHSA-2014:1019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1019
83
reference_url https://access.redhat.com/errata/RHSA-2014:1020
reference_id RHSA-2014:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1020
84
reference_url https://access.redhat.com/errata/RHSA-2014:1021
reference_id RHSA-2014:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1021
85
reference_url https://access.redhat.com/errata/RHSA-2014:1086
reference_id RHSA-2014:1086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1086
86
reference_url https://access.redhat.com/errata/RHSA-2014:1087
reference_id RHSA-2014:1087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1087
87
reference_url https://access.redhat.com/errata/RHSA-2014:1088
reference_id RHSA-2014:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1088
88
reference_url https://usn.ubuntu.com/2299-1/
reference_id USN-2299-1
reference_type
scores
url https://usn.ubuntu.com/2299-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
1
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2014-0226
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbud-pwyt-aye9
116
url VCID-td8g-tmny-jyaa
vulnerability_id VCID-td8g-tmny-jyaa
summary
An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.

This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.


Users are recommended to upgrade to version 2.4.66, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55753.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-55753
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.22106
published_at 2026-04-02T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-04T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28298
published_at 2026-04-13T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28396
published_at 2026-04-09T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28399
published_at 2026-04-11T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28356
published_at 2026-04-12T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28287
published_at 2026-04-07T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28352
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-55753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419140
reference_id 2419140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419140
6
reference_url https://httpd.apache.org/security/json/CVE-2025-55753.json
reference_id CVE-2025-55753
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-55753.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23738
reference_id RHSA-2025:23738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23738
9
reference_url https://access.redhat.com/errata/RHSA-2025:23739
reference_id RHSA-2025:23739
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23739
10
reference_url https://access.redhat.com/errata/RHSA-2026:0009
reference_id RHSA-2026:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0009
11
reference_url https://access.redhat.com/errata/RHSA-2026:0010
reference_id RHSA-2026:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0010
12
reference_url https://access.redhat.com/errata/RHSA-2026:0011
reference_id RHSA-2026:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0011
13
reference_url https://access.redhat.com/errata/RHSA-2026:0012
reference_id RHSA-2026:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0012
14
reference_url https://access.redhat.com/errata/RHSA-2026:0029
reference_id RHSA-2026:0029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0029
15
reference_url https://access.redhat.com/errata/RHSA-2026:0030
reference_id RHSA-2026:0030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0030
16
reference_url https://access.redhat.com/errata/RHSA-2026:0092
reference_id RHSA-2026:0092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0092
17
reference_url https://access.redhat.com/errata/RHSA-2026:0093
reference_id RHSA-2026:0093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0093
18
reference_url https://access.redhat.com/errata/RHSA-2026:0094
reference_id RHSA-2026:0094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0094
19
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
20
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
21
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-55753
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-td8g-tmny-jyaa
117
url VCID-tkm7-pyue-7ffj
vulnerability_id VCID-tkm7-pyue-7ffj
summary The HTTP/2 protocol implementation (mod_http2) had an incomplete handling of the LimitRequestFields directive. This allowed an attacker to inject unlimited request headers into the server, leading to eventual memory exhaustion.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8740.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8740
reference_id
reference_type
scores
0
value 0.68259
scoring_system epss
scoring_elements 0.98589
published_at 2026-04-01T12:55:00Z
1
value 0.68259
scoring_system epss
scoring_elements 0.98603
published_at 2026-04-13T12:55:00Z
2
value 0.68259
scoring_system epss
scoring_elements 0.98601
published_at 2026-04-11T12:55:00Z
3
value 0.68259
scoring_system epss
scoring_elements 0.98602
published_at 2026-04-12T12:55:00Z
4
value 0.68259
scoring_system epss
scoring_elements 0.9859
published_at 2026-04-02T12:55:00Z
5
value 0.68259
scoring_system epss
scoring_elements 0.98594
published_at 2026-04-04T12:55:00Z
6
value 0.68259
scoring_system epss
scoring_elements 0.98595
published_at 2026-04-07T12:55:00Z
7
value 0.68259
scoring_system epss
scoring_elements 0.98598
published_at 2026-04-08T12:55:00Z
8
value 0.68259
scoring_system epss
scoring_elements 0.98599
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1401528
reference_id 1401528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1401528
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847124
reference_id 847124
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847124
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40909.py
reference_id CVE-2016-8740
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40909.py
7
reference_url https://httpd.apache.org/security/json/CVE-2016-8740.json
reference_id CVE-2016-8740
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2016-8740.json
8
reference_url https://security.gentoo.org/glsa/201701-36
reference_id GLSA-201701-36
reference_type
scores
url https://security.gentoo.org/glsa/201701-36
9
reference_url https://access.redhat.com/errata/RHSA-2017:1161
reference_id RHSA-2017:1161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1161
10
reference_url https://access.redhat.com/errata/RHSA-2017:1413
reference_id RHSA-2017:1413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1413
11
reference_url https://access.redhat.com/errata/RHSA-2017:1414
reference_id RHSA-2017:1414
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1414
12
reference_url https://access.redhat.com/errata/RHSA-2017:1415
reference_id RHSA-2017:1415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1415
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2016-8740
risk_score 10.0
exploitability 2.0
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tkm7-pyue-7ffj
118
url VCID-twj7-4qwm-2khv
vulnerability_id VCID-twj7-4qwm-2khv
summary The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7668.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7668
reference_id
reference_type
scores
0
value 0.66384
scoring_system epss
scoring_elements 0.98519
published_at 2026-04-01T12:55:00Z
1
value 0.66384
scoring_system epss
scoring_elements 0.9853
published_at 2026-04-13T12:55:00Z
2
value 0.66384
scoring_system epss
scoring_elements 0.98527
published_at 2026-04-08T12:55:00Z
3
value 0.66384
scoring_system epss
scoring_elements 0.98529
published_at 2026-04-09T12:55:00Z
4
value 0.66384
scoring_system epss
scoring_elements 0.98521
published_at 2026-04-02T12:55:00Z
5
value 0.66384
scoring_system epss
scoring_elements 0.98523
published_at 2026-04-04T12:55:00Z
6
value 0.66384
scoring_system epss
scoring_elements 0.98524
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1463205
reference_id 1463205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1463205
7
reference_url https://security.archlinux.org/ASA-201706-34
reference_id ASA-201706-34
reference_type
scores
url https://security.archlinux.org/ASA-201706-34
8
reference_url https://security.archlinux.org/AVG-316
reference_id AVG-316
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-316
9
reference_url https://httpd.apache.org/security/json/CVE-2017-7668.json
reference_id CVE-2017-7668
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-7668.json
10
reference_url https://security.gentoo.org/glsa/201710-32
reference_id GLSA-201710-32
reference_type
scores
url https://security.gentoo.org/glsa/201710-32
11
reference_url https://access.redhat.com/errata/RHSA-2017:2479
reference_id RHSA-2017:2479
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2479
12
reference_url https://access.redhat.com/errata/RHSA-2017:2483
reference_id RHSA-2017:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2483
13
reference_url https://access.redhat.com/errata/RHSA-2017:3193
reference_id RHSA-2017:3193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3193
14
reference_url https://access.redhat.com/errata/RHSA-2017:3194
reference_id RHSA-2017:3194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3194
15
reference_url https://usn.ubuntu.com/3340-1/
reference_id USN-3340-1
reference_type
scores
url https://usn.ubuntu.com/3340-1/
16
reference_url https://usn.ubuntu.com/3373-1/
reference_id USN-3373-1
reference_type
scores
url https://usn.ubuntu.com/3373-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-7668
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twj7-4qwm-2khv
119
url VCID-ugdv-apr8-g3bz
vulnerability_id VCID-ugdv-apr8-g3bz
summary In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0215.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0215.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0215
reference_id
reference_type
scores
0
value 0.07501
scoring_system epss
scoring_elements 0.91756
published_at 2026-04-01T12:55:00Z
1
value 0.07501
scoring_system epss
scoring_elements 0.91802
published_at 2026-04-12T12:55:00Z
2
value 0.07501
scoring_system epss
scoring_elements 0.91778
published_at 2026-04-07T12:55:00Z
3
value 0.07501
scoring_system epss
scoring_elements 0.91791
published_at 2026-04-08T12:55:00Z
4
value 0.07501
scoring_system epss
scoring_elements 0.91798
published_at 2026-04-13T12:55:00Z
5
value 0.07501
scoring_system epss
scoring_elements 0.91801
published_at 2026-04-11T12:55:00Z
6
value 0.07501
scoring_system epss
scoring_elements 0.91764
published_at 2026-04-02T12:55:00Z
7
value 0.07501
scoring_system epss
scoring_elements 0.91771
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0215
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0215
3
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
4
reference_url https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb%40%3Cdev.httpd.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/2d6bd429a0ba9af1580da896575cfca6e42bb05e7536562d4b095fcf%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47%40%3Cdev.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/bc1a6d4137798565ab02e60079b6788442147f4efeb4200c665bed5b%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
23
reference_url https://security.netapp.com/advisory/ntap-20190423-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190423-0001/
24
reference_url https://support.f5.com/csp/article/K59440504
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K59440504
25
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
26
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
27
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
28
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
29
reference_url http://www.openwall.com/lists/oss-security/2019/04/02/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/04/02/4
30
reference_url http://www.securityfocus.com/bid/107667
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107667
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1695025
reference_id 1695025
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1695025
32
reference_url https://security.archlinux.org/ASA-201904-3
reference_id ASA-201904-3
reference_type
scores
url https://security.archlinux.org/ASA-201904-3
33
reference_url https://security.archlinux.org/AVG-946
reference_id AVG-946
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-946
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.38:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
38
reference_url https://httpd.apache.org/security/json/CVE-2019-0215.json
reference_id CVE-2019-0215
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-0215.json
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-0215
reference_id CVE-2019-0215
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-0215
40
reference_url https://access.redhat.com/errata/RHSA-2019:0980
reference_id RHSA-2019:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0980
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2019-0215
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugdv-apr8-g3bz
120
url VCID-uwqg-yytc-vfae
vulnerability_id VCID-uwqg-yytc-vfae
summary When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0220.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0220.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0220
reference_id
reference_type
scores
0
value 0.20275
scoring_system epss
scoring_elements 0.95478
published_at 2026-04-01T12:55:00Z
1
value 0.20275
scoring_system epss
scoring_elements 0.95514
published_at 2026-04-13T12:55:00Z
2
value 0.20275
scoring_system epss
scoring_elements 0.95507
published_at 2026-04-09T12:55:00Z
3
value 0.20275
scoring_system epss
scoring_elements 0.95512
published_at 2026-04-11T12:55:00Z
4
value 0.20275
scoring_system epss
scoring_elements 0.95513
published_at 2026-04-12T12:55:00Z
5
value 0.20275
scoring_system epss
scoring_elements 0.95488
published_at 2026-04-02T12:55:00Z
6
value 0.20275
scoring_system epss
scoring_elements 0.95494
published_at 2026-04-04T12:55:00Z
7
value 0.20275
scoring_system epss
scoring_elements 0.95498
published_at 2026-04-07T12:55:00Z
8
value 0.20275
scoring_system epss
scoring_elements 0.95505
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0220
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1695036
reference_id 1695036
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1695036
10
reference_url https://security.archlinux.org/ASA-201904-3
reference_id ASA-201904-3
reference_type
scores
url https://security.archlinux.org/ASA-201904-3
11
reference_url https://security.archlinux.org/AVG-946
reference_id AVG-946
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-946
12
reference_url https://httpd.apache.org/security/json/CVE-2019-0220.json
reference_id CVE-2019-0220
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-0220.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:2343
reference_id RHSA-2019:2343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2343
14
reference_url https://access.redhat.com/errata/RHSA-2019:3436
reference_id RHSA-2019:3436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3436
15
reference_url https://access.redhat.com/errata/RHSA-2019:4126
reference_id RHSA-2019:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4126
16
reference_url https://access.redhat.com/errata/RHSA-2020:0250
reference_id RHSA-2020:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0250
17
reference_url https://access.redhat.com/errata/RHSA-2020:0251
reference_id RHSA-2020:0251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0251
18
reference_url https://usn.ubuntu.com/3937-1/
reference_id USN-3937-1
reference_type
scores
url https://usn.ubuntu.com/3937-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2019-0220
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uwqg-yytc-vfae
121
url VCID-v41h-pbbe-zfas
vulnerability_id VCID-v41h-pbbe-zfas
summary HTTP/2 very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10081.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10081
reference_id
reference_type
scores
0
value 0.28784
scoring_system epss
scoring_elements 0.96516
published_at 2026-04-01T12:55:00Z
1
value 0.28784
scoring_system epss
scoring_elements 0.96549
published_at 2026-04-13T12:55:00Z
2
value 0.28784
scoring_system epss
scoring_elements 0.96544
published_at 2026-04-09T12:55:00Z
3
value 0.28784
scoring_system epss
scoring_elements 0.96546
published_at 2026-04-12T12:55:00Z
4
value 0.28784
scoring_system epss
scoring_elements 0.96525
published_at 2026-04-02T12:55:00Z
5
value 0.28784
scoring_system epss
scoring_elements 0.96529
published_at 2026-04-04T12:55:00Z
6
value 0.28784
scoring_system epss
scoring_elements 0.96533
published_at 2026-04-07T12:55:00Z
7
value 0.28784
scoring_system epss
scoring_elements 0.96542
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1743966
reference_id 1743966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1743966
9
reference_url https://httpd.apache.org/security/json/CVE-2019-10081.json
reference_id CVE-2019-10081
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-10081.json
10
reference_url https://security.gentoo.org/glsa/201909-04
reference_id GLSA-201909-04
reference_type
scores
url https://security.gentoo.org/glsa/201909-04
11
reference_url https://access.redhat.com/errata/RHSA-2020:1336
reference_id RHSA-2020:1336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1336
12
reference_url https://access.redhat.com/errata/RHSA-2020:1337
reference_id RHSA-2020:1337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1337
13
reference_url https://access.redhat.com/errata/RHSA-2020:4751
reference_id RHSA-2020:4751
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4751
14
reference_url https://usn.ubuntu.com/4113-1/
reference_id USN-4113-1
reference_type
scores
url https://usn.ubuntu.com/4113-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
2
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2019-10081
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v41h-pbbe-zfas
122
url VCID-varh-ysfr-euc8
vulnerability_id VCID-varh-ysfr-euc8
summary
mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66200.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66200.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-66200
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17472
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17519
published_at 2026-04-04T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21507
published_at 2026-04-13T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21591
published_at 2026-04-09T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21602
published_at 2026-04-11T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21564
published_at 2026-04-12T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21456
published_at 2026-04-07T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21532
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-66200
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419262
reference_id 2419262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419262
6
reference_url https://httpd.apache.org/security/json/CVE-2025-66200.json
reference_id CVE-2025-66200
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-66200.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
11
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
12
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-66200
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-varh-ysfr-euc8
123
url VCID-w6p6-u8ku-k3f6
vulnerability_id VCID-w6p6-u8ku-k3f6
summary In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0217.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0217.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-0217
reference_id
reference_type
scores
0
value 0.43022
scoring_system epss
scoring_elements 0.97464
published_at 2026-04-01T12:55:00Z
1
value 0.43022
scoring_system epss
scoring_elements 0.97488
published_at 2026-04-13T12:55:00Z
2
value 0.43022
scoring_system epss
scoring_elements 0.97475
published_at 2026-04-07T12:55:00Z
3
value 0.43022
scoring_system epss
scoring_elements 0.97481
published_at 2026-04-08T12:55:00Z
4
value 0.43022
scoring_system epss
scoring_elements 0.97482
published_at 2026-04-09T12:55:00Z
5
value 0.43022
scoring_system epss
scoring_elements 0.97485
published_at 2026-04-11T12:55:00Z
6
value 0.43022
scoring_system epss
scoring_elements 0.97487
published_at 2026-04-12T12:55:00Z
7
value 0.43022
scoring_system epss
scoring_elements 0.97471
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-0217
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17189
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
13
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808%40%3Cdev.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808%40%3Cdev.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
30
reference_url https://seclists.org/bugtraq/2019/Apr/5
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/5
31
reference_url https://security.netapp.com/advisory/ntap-20190423-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190423-0001/
32
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
33
reference_url https://www.debian.org/security/2019/dsa-4422
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4422
34
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
35
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
36
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
37
reference_url http://www.openwall.com/lists/oss-security/2019/04/02/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/04/02/5
38
reference_url http://www.securityfocus.com/bid/107668
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107668
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1695020
reference_id 1695020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1695020
40
reference_url https://security.archlinux.org/ASA-201904-3
reference_id ASA-201904-3
reference_type
scores
url https://security.archlinux.org/ASA-201904-3
41
reference_url https://security.archlinux.org/AVG-946
reference_id AVG-946
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-946
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:-:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
66
reference_url https://httpd.apache.org/security/json/CVE-2019-0217.json
reference_id CVE-2019-0217
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-0217.json
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-0217
reference_id CVE-2019-0217
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-0217
68
reference_url https://access.redhat.com/errata/RHSA-2019:2343
reference_id RHSA-2019:2343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2343
69
reference_url https://access.redhat.com/errata/RHSA-2019:3436
reference_id RHSA-2019:3436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3436
70
reference_url https://access.redhat.com/errata/RHSA-2019:3932
reference_id RHSA-2019:3932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3932
71
reference_url https://access.redhat.com/errata/RHSA-2019:3933
reference_id RHSA-2019:3933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3933
72
reference_url https://access.redhat.com/errata/RHSA-2019:3935
reference_id RHSA-2019:3935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3935
73
reference_url https://access.redhat.com/errata/RHSA-2019:4126
reference_id RHSA-2019:4126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4126
74
reference_url https://usn.ubuntu.com/3937-1/
reference_id USN-3937-1
reference_type
scores
url https://usn.ubuntu.com/3937-1/
75
reference_url https://usn.ubuntu.com/3937-2/
reference_id USN-3937-2
reference_type
scores
url https://usn.ubuntu.com/3937-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2019-0217
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6p6-u8ku-k3f6
124
url VCID-wgte-97r1-j7a9
vulnerability_id VCID-wgte-97r1-j7a9
summary For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11985.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11985.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11985
reference_id
reference_type
scores
0
value 0.15318
scoring_system epss
scoring_elements 0.94596
published_at 2026-04-01T12:55:00Z
1
value 0.15318
scoring_system epss
scoring_elements 0.94633
published_at 2026-04-13T12:55:00Z
2
value 0.15318
scoring_system epss
scoring_elements 0.94626
published_at 2026-04-09T12:55:00Z
3
value 0.15318
scoring_system epss
scoring_elements 0.9463
published_at 2026-04-11T12:55:00Z
4
value 0.15318
scoring_system epss
scoring_elements 0.94603
published_at 2026-04-02T12:55:00Z
5
value 0.15318
scoring_system epss
scoring_elements 0.9461
published_at 2026-04-04T12:55:00Z
6
value 0.15318
scoring_system epss
scoring_elements 0.94611
published_at 2026-04-07T12:55:00Z
7
value 0.15318
scoring_system epss
scoring_elements 0.94621
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11985
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11985
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1866559
reference_id 1866559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1866559
5
reference_url https://httpd.apache.org/security/json/CVE-2020-11985.json
reference_id CVE-2020-11985
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2020-11985.json
6
reference_url https://security.gentoo.org/glsa/202008-04
reference_id GLSA-202008-04
reference_type
scores
url https://security.gentoo.org/glsa/202008-04
7
reference_url https://access.redhat.com/errata/RHSA-2017:1161
reference_id RHSA-2017:1161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1161
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
aliases CVE-2020-11985
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgte-97r1-j7a9
125
url VCID-wrw6-uzz4-rkfb
vulnerability_id VCID-wrw6-uzz4-rkfb
summary
ap_escape_quotes() may write beyond the end of a buffer when given malicious input.  
No included modules pass untrusted data to these functions, but third-party / external modules may.

This issue affects Apache HTTP Server 2.4.48 and earlier.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39275.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39275.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-39275
reference_id
reference_type
scores
0
value 0.37674
scoring_system epss
scoring_elements 0.97171
published_at 2026-04-01T12:55:00Z
1
value 0.37674
scoring_system epss
scoring_elements 0.97199
published_at 2026-04-13T12:55:00Z
2
value 0.37674
scoring_system epss
scoring_elements 0.97193
published_at 2026-04-08T12:55:00Z
3
value 0.37674
scoring_system epss
scoring_elements 0.97194
published_at 2026-04-09T12:55:00Z
4
value 0.37674
scoring_system epss
scoring_elements 0.97198
published_at 2026-04-11T12:55:00Z
5
value 0.37674
scoring_system epss
scoring_elements 0.97177
published_at 2026-04-02T12:55:00Z
6
value 0.37674
scoring_system epss
scoring_elements 0.97183
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-39275
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2005119
reference_id 2005119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2005119
8
reference_url https://security.archlinux.org/AVG-2289
reference_id AVG-2289
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2289
9
reference_url https://httpd.apache.org/security/json/CVE-2021-39275.json
reference_id CVE-2021-39275
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-39275.json
10
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
11
reference_url https://access.redhat.com/errata/RHSA-2022:0143
reference_id RHSA-2022:0143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0143
12
reference_url https://access.redhat.com/errata/RHSA-2022:0891
reference_id RHSA-2022:0891
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0891
13
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
14
reference_url https://access.redhat.com/errata/RHSA-2022:7143
reference_id RHSA-2022:7143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7143
15
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
16
reference_url https://usn.ubuntu.com/5090-1/
reference_id USN-5090-1
reference_type
scores
url https://usn.ubuntu.com/5090-1/
17
reference_url https://usn.ubuntu.com/5090-2/
reference_id USN-5090-2
reference_type
scores
url https://usn.ubuntu.com/5090-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-39275
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrw6-uzz4-rkfb
126
url VCID-wshe-gf99-tbg6
vulnerability_id VCID-wshe-gf99-tbg6
summary A maliciously constructed HTTP/2 request could cause mod_http2 to dereference a NULL pointer and crash the server process.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7659.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7659
reference_id
reference_type
scores
0
value 0.38383
scoring_system epss
scoring_elements 0.97208
published_at 2026-04-01T12:55:00Z
1
value 0.38383
scoring_system epss
scoring_elements 0.97235
published_at 2026-04-13T12:55:00Z
2
value 0.38383
scoring_system epss
scoring_elements 0.9722
published_at 2026-04-07T12:55:00Z
3
value 0.38383
scoring_system epss
scoring_elements 0.9723
published_at 2026-04-08T12:55:00Z
4
value 0.38383
scoring_system epss
scoring_elements 0.97231
published_at 2026-04-09T12:55:00Z
5
value 0.38383
scoring_system epss
scoring_elements 0.97234
published_at 2026-04-11T12:55:00Z
6
value 0.38383
scoring_system epss
scoring_elements 0.97213
published_at 2026-04-02T12:55:00Z
7
value 0.38383
scoring_system epss
scoring_elements 0.97219
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1463199
reference_id 1463199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1463199
5
reference_url https://security.archlinux.org/ASA-201706-34
reference_id ASA-201706-34
reference_type
scores
url https://security.archlinux.org/ASA-201706-34
6
reference_url https://security.archlinux.org/AVG-316
reference_id AVG-316
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-316
7
reference_url https://httpd.apache.org/security/json/CVE-2017-7659.json
reference_id CVE-2017-7659
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-7659.json
8
reference_url https://security.gentoo.org/glsa/201710-32
reference_id GLSA-201710-32
reference_type
scores
url https://security.gentoo.org/glsa/201710-32
9
reference_url https://access.redhat.com/errata/RHSA-2017:2483
reference_id RHSA-2017:2483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2483
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-7659
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wshe-gf99-tbg6
127
url VCID-ww49-y35r-ykdd
vulnerability_id VCID-ww49-y35r-ykdd
summary
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.

Users are recommended to upgrade to version 2.4.64 which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43204.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-43204
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45583
published_at 2026-04-02T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45605
published_at 2026-04-04T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46255
published_at 2026-04-13T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.4625
published_at 2026-04-09T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46273
published_at 2026-04-11T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46245
published_at 2026-04-12T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46192
published_at 2026-04-07T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46248
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-43204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374553
reference_id 2374553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374553
5
reference_url https://httpd.apache.org/security/json/CVE-2024-43204.json
reference_id CVE-2024-43204
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-43204.json
6
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
7
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2024-43204
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ww49-y35r-ykdd
128
url VCID-xa3c-7qgs-5bgf
vulnerability_id VCID-xa3c-7qgs-5bgf
summary httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3639.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3639
reference_id
reference_type
scores
0
value 0.08615
scoring_system epss
scoring_elements 0.92392
published_at 2026-04-01T12:55:00Z
1
value 0.08615
scoring_system epss
scoring_elements 0.92399
published_at 2026-04-02T12:55:00Z
2
value 0.08615
scoring_system epss
scoring_elements 0.92407
published_at 2026-04-04T12:55:00Z
3
value 0.08615
scoring_system epss
scoring_elements 0.9241
published_at 2026-04-07T12:55:00Z
4
value 0.08615
scoring_system epss
scoring_elements 0.92422
published_at 2026-04-08T12:55:00Z
5
value 0.08615
scoring_system epss
scoring_elements 0.92427
published_at 2026-04-09T12:55:00Z
6
value 0.08615
scoring_system epss
scoring_elements 0.92433
published_at 2026-04-13T12:55:00Z
7
value 0.08615
scoring_system epss
scoring_elements 0.92435
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3639
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3639
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=752080
reference_id 752080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=752080
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36663.txt
reference_id CVE-2011-3639;OSVDB-77444
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36663.txt
5
reference_url https://www.securityfocus.com/bid/51869/info
reference_id CVE-2011-3639;OSVDB-77444
reference_type exploit
scores
url https://www.securityfocus.com/bid/51869/info
6
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
7
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2011-3639
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa3c-7qgs-5bgf
129
url VCID-xfm9-e5nr-wyat
vulnerability_id VCID-xfm9-e5nr-wyat
summary
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes.

This issue affects Apache HTTP Server 2.4.52 and earlier.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22721.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22721
reference_id
reference_type
scores
0
value 0.13159
scoring_system epss
scoring_elements 0.94126
published_at 2026-04-11T12:55:00Z
1
value 0.13159
scoring_system epss
scoring_elements 0.94121
published_at 2026-04-09T12:55:00Z
2
value 0.13159
scoring_system epss
scoring_elements 0.94104
published_at 2026-04-04T12:55:00Z
3
value 0.13159
scoring_system epss
scoring_elements 0.94108
published_at 2026-04-07T12:55:00Z
4
value 0.13159
scoring_system epss
scoring_elements 0.94117
published_at 2026-04-08T12:55:00Z
5
value 0.13159
scoring_system epss
scoring_elements 0.94093
published_at 2026-04-02T12:55:00Z
6
value 0.13224
scoring_system epss
scoring_elements 0.94143
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064320
reference_id 2064320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064320
5
reference_url https://httpd.apache.org/security/json/CVE-2022-22721.json
reference_id CVE-2022-22721
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2022-22721.json
6
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
7
reference_url https://access.redhat.com/errata/RHSA-2022:6753
reference_id RHSA-2022:6753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6753
8
reference_url https://access.redhat.com/errata/RHSA-2022:7647
reference_id RHSA-2022:7647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7647
9
reference_url https://access.redhat.com/errata/RHSA-2022:8067
reference_id RHSA-2022:8067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8067
10
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
11
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
12
reference_url https://usn.ubuntu.com/5333-1/
reference_id USN-5333-1
reference_type
scores
url https://usn.ubuntu.com/5333-1/
13
reference_url https://usn.ubuntu.com/5333-2/
reference_id USN-5333-2
reference_type
scores
url https://usn.ubuntu.com/5333-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2022-22721
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xfm9-e5nr-wyat
130
url VCID-xhyc-9rpu-2bc8
vulnerability_id VCID-xhyc-9rpu-2bc8
summary
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.

This issue affects Apache HTTP Server: through 2.4.58.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38709.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38709.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38709
reference_id
reference_type
scores
0
value 0.03255
scoring_system epss
scoring_elements 0.87129
published_at 2026-04-13T12:55:00Z
1
value 0.03255
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-11T12:55:00Z
2
value 0.03255
scoring_system epss
scoring_elements 0.87134
published_at 2026-04-12T12:55:00Z
3
value 0.03342
scoring_system epss
scoring_elements 0.87294
published_at 2026-04-08T12:55:00Z
4
value 0.03342
scoring_system epss
scoring_elements 0.87277
published_at 2026-04-04T12:55:00Z
5
value 0.03342
scoring_system epss
scoring_elements 0.87261
published_at 2026-04-02T12:55:00Z
6
value 0.03342
scoring_system epss
scoring_elements 0.87275
published_at 2026-04-07T12:55:00Z
7
value 0.03342
scoring_system epss
scoring_elements 0.87302
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38709
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068412
reference_id 1068412
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068412
10
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:57:02Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2273491
reference_id 2273491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2273491
12
reference_url http://www.openwall.com/lists/oss-security/2024/04/04/3
reference_id 3
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:57:02Z/
url http://www.openwall.com/lists/oss-security/2024/04/04/3
13
reference_url https://httpd.apache.org/security/json/CVE-2023-38709.json
reference_id CVE-2023-38709
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2023-38709.json
14
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
15
reference_url https://support.apple.com/kb/HT214119
reference_id HT214119
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:57:02Z/
url https://support.apple.com/kb/HT214119
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/
reference_id I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:57:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/
reference_id LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:57:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/
18
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:57:02Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html
19
reference_url https://security.netapp.com/advisory/ntap-20240415-0013/
reference_id ntap-20240415-0013
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:57:02Z/
url https://security.netapp.com/advisory/ntap-20240415-0013/
20
reference_url https://access.redhat.com/errata/RHSA-2024:4197
reference_id RHSA-2024:4197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4197
21
reference_url https://access.redhat.com/errata/RHSA-2024:6927
reference_id RHSA-2024:6927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6927
22
reference_url https://access.redhat.com/errata/RHSA-2024:6928
reference_id RHSA-2024:6928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6928
23
reference_url https://access.redhat.com/errata/RHSA-2024:9306
reference_id RHSA-2024:9306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9306
24
reference_url https://usn.ubuntu.com/6729-1/
reference_id USN-6729-1
reference_type
scores
url https://usn.ubuntu.com/6729-1/
25
reference_url https://usn.ubuntu.com/6729-2/
reference_id USN-6729-2
reference_type
scores
url https://usn.ubuntu.com/6729-2/
26
reference_url https://usn.ubuntu.com/6729-3/
reference_id USN-6729-3
reference_type
scores
url https://usn.ubuntu.com/6729-3/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/
reference_id WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:57:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2023-38709
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhyc-9rpu-2bc8
131
url VCID-xnfs-bpwj-3ycp
vulnerability_id VCID-xnfs-bpwj-3ycp
summary
An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern.
This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.

This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.

Users are recommended to upgrade to version 2.4.58, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43622.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43622
reference_id
reference_type
scores
0
value 0.59064
scoring_system epss
scoring_elements 0.98216
published_at 2026-04-02T12:55:00Z
1
value 0.61258
scoring_system epss
scoring_elements 0.98318
published_at 2026-04-13T12:55:00Z
2
value 0.61258
scoring_system epss
scoring_elements 0.98307
published_at 2026-04-04T12:55:00Z
3
value 0.61258
scoring_system epss
scoring_elements 0.98309
published_at 2026-04-07T12:55:00Z
4
value 0.61258
scoring_system epss
scoring_elements 0.98314
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43622
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245153
reference_id 2245153
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245153
10
reference_url https://httpd.apache.org/security/json/CVE-2023-43622.json
reference_id CVE-2023-43622
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2023-43622.json
11
reference_url https://security.netapp.com/advisory/ntap-20231027-0011/
reference_id ntap-20231027-0011
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T16:02:28Z/
url https://security.netapp.com/advisory/ntap-20231027-0011/
12
reference_url https://access.redhat.com/errata/RHSA-2024:2368
reference_id RHSA-2024:2368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2368
13
reference_url https://usn.ubuntu.com/6506-1/
reference_id USN-6506-1
reference_type
scores
url https://usn.ubuntu.com/6506-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2023-43622
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xnfs-bpwj-3ycp
132
url VCID-xwnu-h1xh-3bg6
vulnerability_id VCID-xwnu-h1xh-3bg6
summary
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts).
The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one.

This issue affects Apache HTTP Server 2.4.51 and earlier.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44790.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44790.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44790
reference_id
reference_type
scores
0
value 0.86011
scoring_system epss
scoring_elements 0.99393
published_at 2026-04-13T12:55:00Z
1
value 0.87092
scoring_system epss
scoring_elements 0.99437
published_at 2026-04-02T12:55:00Z
2
value 0.87092
scoring_system epss
scoring_elements 0.99438
published_at 2026-04-01T12:55:00Z
3
value 0.87092
scoring_system epss
scoring_elements 0.99439
published_at 2026-04-07T12:55:00Z
4
value 0.87092
scoring_system epss
scoring_elements 0.99441
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44790
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034674
reference_id 2034674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034674
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/51193.py
reference_id CVE-2021-44790
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/51193.py
7
reference_url https://httpd.apache.org/security/json/CVE-2021-44790.json
reference_id CVE-2021-44790
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2021-44790.json
8
reference_url https://security.gentoo.org/glsa/202208-20
reference_id GLSA-202208-20
reference_type
scores
url https://security.gentoo.org/glsa/202208-20
9
reference_url https://access.redhat.com/errata/RHSA-2022:0143
reference_id RHSA-2022:0143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0143
10
reference_url https://access.redhat.com/errata/RHSA-2022:0258
reference_id RHSA-2022:0258
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0258
11
reference_url https://access.redhat.com/errata/RHSA-2022:0288
reference_id RHSA-2022:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0288
12
reference_url https://access.redhat.com/errata/RHSA-2022:0303
reference_id RHSA-2022:0303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0303
13
reference_url https://access.redhat.com/errata/RHSA-2022:1136
reference_id RHSA-2022:1136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1136
14
reference_url https://access.redhat.com/errata/RHSA-2022:1137
reference_id RHSA-2022:1137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1137
15
reference_url https://access.redhat.com/errata/RHSA-2022:1138
reference_id RHSA-2022:1138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1138
16
reference_url https://access.redhat.com/errata/RHSA-2022:1139
reference_id RHSA-2022:1139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1139
17
reference_url https://usn.ubuntu.com/5212-1/
reference_id USN-5212-1
reference_type
scores
url https://usn.ubuntu.com/5212-1/
18
reference_url https://usn.ubuntu.com/5212-2/
reference_id USN-5212-2
reference_type
scores
url https://usn.ubuntu.com/5212-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2021-44790
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwnu-h1xh-3bg6
133
url VCID-y3k1-c4rn-xbc2
vulnerability_id VCID-y3k1-c4rn-xbc2
summary A malicious client could perform a DoS attack by flooding a connection with requests and basically never reading responses on the TCP connection. Depending on h2 worker dimensioning, it was possible to block those with relatively few connections.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9517.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9517
reference_id
reference_type
scores
0
value 0.04564
scoring_system epss
scoring_elements 0.89159
published_at 2026-04-02T12:55:00Z
1
value 0.04564
scoring_system epss
scoring_elements 0.89153
published_at 2026-04-01T12:55:00Z
2
value 0.05964
scoring_system epss
scoring_elements 0.90652
published_at 2026-04-13T12:55:00Z
3
value 0.05964
scoring_system epss
scoring_elements 0.90648
published_at 2026-04-09T12:55:00Z
4
value 0.05964
scoring_system epss
scoring_elements 0.90657
published_at 2026-04-12T12:55:00Z
5
value 0.05964
scoring_system epss
scoring_elements 0.90624
published_at 2026-04-04T12:55:00Z
6
value 0.05964
scoring_system epss
scoring_elements 0.90631
published_at 2026-04-07T12:55:00Z
7
value 0.05964
scoring_system epss
scoring_elements 0.90643
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1741868
reference_id 1741868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1741868
9
reference_url https://httpd.apache.org/security/json/CVE-2019-9517.json
reference_id CVE-2019-9517
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2019-9517.json
10
reference_url https://security.gentoo.org/glsa/201909-04
reference_id GLSA-201909-04
reference_type
scores
url https://security.gentoo.org/glsa/201909-04
11
reference_url https://access.redhat.com/errata/RHSA-2019:2893
reference_id RHSA-2019:2893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2893
12
reference_url https://access.redhat.com/errata/RHSA-2019:2946
reference_id RHSA-2019:2946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2946
13
reference_url https://access.redhat.com/errata/RHSA-2019:2949
reference_id RHSA-2019:2949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2949
14
reference_url https://access.redhat.com/errata/RHSA-2019:2950
reference_id RHSA-2019:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2950
15
reference_url https://access.redhat.com/errata/RHSA-2019:3932
reference_id RHSA-2019:3932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3932
16
reference_url https://access.redhat.com/errata/RHSA-2019:3933
reference_id RHSA-2019:3933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3933
17
reference_url https://access.redhat.com/errata/RHSA-2019:3935
reference_id RHSA-2019:3935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3935
18
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
19
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
20
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
21
reference_url https://usn.ubuntu.com/4113-1/
reference_id USN-4113-1
reference_type
scores
url https://usn.ubuntu.com/4113-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
1
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
2
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2019-9517
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3k1-c4rn-xbc2
134
url VCID-ym93-sxb8-fkdm
vulnerability_id VCID-ym93-sxb8-fkdm
summary A flaw was found in the handling of the scoreboard. An unprivileged child process could cause the parent process to crash at shutdown rather than terminate cleanly.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0031.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0031.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0031
reference_id
reference_type
scores
0
value 0.01196
scoring_system epss
scoring_elements 0.78884
published_at 2026-04-13T12:55:00Z
1
value 0.01196
scoring_system epss
scoring_elements 0.78837
published_at 2026-04-01T12:55:00Z
2
value 0.01196
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-02T12:55:00Z
3
value 0.01196
scoring_system epss
scoring_elements 0.78872
published_at 2026-04-04T12:55:00Z
4
value 0.01196
scoring_system epss
scoring_elements 0.78854
published_at 2026-04-07T12:55:00Z
5
value 0.01196
scoring_system epss
scoring_elements 0.78879
published_at 2026-04-08T12:55:00Z
6
value 0.01196
scoring_system epss
scoring_elements 0.78886
published_at 2026-04-09T12:55:00Z
7
value 0.01196
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-11T12:55:00Z
8
value 0.01196
scoring_system epss
scoring_elements 0.78893
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0031
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=773744
reference_id 773744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=773744
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41768.txt
reference_id CVE-2012-0031
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41768.txt
5
reference_url https://httpd.apache.org/security/json/CVE-2012-0031.json
reference_id CVE-2012-0031
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0031.json
6
reference_url http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/
reference_id CVE-2012-0031
reference_type exploit
scores
url http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
10
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
11
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
12
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
purl pkg:deb/debian/apache2@2.2.22-13%2Bdeb7u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-1bv2-mkj8-ubaz
3
vulnerability VCID-1d24-sy5z-jfhh
4
vulnerability VCID-1zk6-7wv2-ukcz
5
vulnerability VCID-2d8p-bbc1-hkfa
6
vulnerability VCID-2e6w-fs4j-17g9
7
vulnerability VCID-2nmh-7tfa-zyb2
8
vulnerability VCID-2xc4-7zg9-y7fw
9
vulnerability VCID-3ay7-bwah-2yd1
10
vulnerability VCID-3djp-gq4c-1fa9
11
vulnerability VCID-3wuk-hwg1-6fa6
12
vulnerability VCID-4c3m-m6ku-kbhq
13
vulnerability VCID-4d3t-es7p-9qhn
14
vulnerability VCID-4sss-a8ne-kqbc
15
vulnerability VCID-5bej-9h7w-33c8
16
vulnerability VCID-5crp-xumw-v7gb
17
vulnerability VCID-5qkp-3w54-j3a5
18
vulnerability VCID-5xrt-1n1q-4bey
19
vulnerability VCID-66k7-maf9-dfcd
20
vulnerability VCID-6b7y-562y-suce
21
vulnerability VCID-6pzx-1e5t-xbes
22
vulnerability VCID-6qk8-1cj1-4fh7
23
vulnerability VCID-6tgh-b4td-63f5
24
vulnerability VCID-6vxq-uxxw-ybeh
25
vulnerability VCID-7u2r-egf2-vfhx
26
vulnerability VCID-7vfk-1dwm-xbbt
27
vulnerability VCID-7vjg-vetg-p7f6
28
vulnerability VCID-7zer-dq7c-8ffq
29
vulnerability VCID-8axm-4anr-27ht
30
vulnerability VCID-8edq-8rvq-rkf1
31
vulnerability VCID-8eqf-c42n-y7dt
32
vulnerability VCID-8gcm-7q3n-q7bm
33
vulnerability VCID-8nw9-zpxn-ckab
34
vulnerability VCID-9qdr-1v39-d7b7
35
vulnerability VCID-9tez-97xg-z3bs
36
vulnerability VCID-9u53-b79b-cfgd
37
vulnerability VCID-9vzm-qtye-ufh2
38
vulnerability VCID-9ych-ybpr-j3h6
39
vulnerability VCID-a9rw-3s1y-hqd7
40
vulnerability VCID-apfh-r85v-dbhz
41
vulnerability VCID-auhk-ppv5-buaa
42
vulnerability VCID-b68y-4prb-bfdk
43
vulnerability VCID-b9ks-detx-nkdw
44
vulnerability VCID-bau7-pme5-ckbt
45
vulnerability VCID-bvkg-nrwd-e7g8
46
vulnerability VCID-cqjv-6m9n-mfeq
47
vulnerability VCID-ct26-19cq-8kd7
48
vulnerability VCID-d36c-rrxh-ybgv
49
vulnerability VCID-db6k-j9mj-e7hy
50
vulnerability VCID-e3jc-83a7-8uhh
51
vulnerability VCID-edvy-cern-6kcu
52
vulnerability VCID-eesz-v6ae-gya3
53
vulnerability VCID-ehv1-yvpu-ubcg
54
vulnerability VCID-ej7y-7na3-5qby
55
vulnerability VCID-f2y3-s6j8-7ygr
56
vulnerability VCID-fnxp-n271-mfd8
57
vulnerability VCID-fqem-96w3-rucb
58
vulnerability VCID-fsh3-7b9j-dfgf
59
vulnerability VCID-ftjw-9fb6-d3cw
60
vulnerability VCID-fyrq-yg2u-jkc7
61
vulnerability VCID-fz8c-b8r4-1yb8
62
vulnerability VCID-g55m-t4s1-nfhv
63
vulnerability VCID-g6xr-qtwz-2yaq
64
vulnerability VCID-gqat-458a-67g2
65
vulnerability VCID-gv84-vfvh-y7hu
66
vulnerability VCID-h6kk-81jx-h7b8
67
vulnerability VCID-ha7f-21gy-3qa2
68
vulnerability VCID-hm3f-m22n-u3gy
69
vulnerability VCID-htfx-mahy-9kde
70
vulnerability VCID-jt89-ruvk-1kbj
71
vulnerability VCID-jzuw-73df-mfff
72
vulnerability VCID-k4kb-21tp-4kc8
73
vulnerability VCID-k4nk-qqxg-s7e6
74
vulnerability VCID-ke1s-451y-p3cz
75
vulnerability VCID-kkuy-1j91-9bb2
76
vulnerability VCID-kpew-rarv-83dg
77
vulnerability VCID-kv7f-t14h-2bfv
78
vulnerability VCID-m9fd-9pya-xucw
79
vulnerability VCID-mtg7-8556-kbgd
80
vulnerability VCID-na94-5565-dyfc
81
vulnerability VCID-nb91-camp-eufc
82
vulnerability VCID-p2a1-afnh-7qca
83
vulnerability VCID-pc2n-ga7g-byga
84
vulnerability VCID-pjxs-hnjr-duey
85
vulnerability VCID-pnc8-bb23-vqh1
86
vulnerability VCID-pz6f-mahv-hue8
87
vulnerability VCID-q5wm-suxb-jfeb
88
vulnerability VCID-qayj-kts9-3fde
89
vulnerability VCID-qc9j-x576-ayc1
90
vulnerability VCID-qjeh-n57t-y7g5
91
vulnerability VCID-qm7e-n9ay-hufy
92
vulnerability VCID-r2pc-wuzb-h7hk
93
vulnerability VCID-r471-g9xs-sbga
94
vulnerability VCID-rdtq-8ng5-53fn
95
vulnerability VCID-rfqy-e7pv-dyfy
96
vulnerability VCID-scf1-zmu7-e3b2
97
vulnerability VCID-t67v-c4gx-ukbj
98
vulnerability VCID-tbud-pwyt-aye9
99
vulnerability VCID-td8g-tmny-jyaa
100
vulnerability VCID-tkm7-pyue-7ffj
101
vulnerability VCID-twj7-4qwm-2khv
102
vulnerability VCID-ugdv-apr8-g3bz
103
vulnerability VCID-uwqg-yytc-vfae
104
vulnerability VCID-v41h-pbbe-zfas
105
vulnerability VCID-varh-ysfr-euc8
106
vulnerability VCID-w6p6-u8ku-k3f6
107
vulnerability VCID-wgte-97r1-j7a9
108
vulnerability VCID-wrw6-uzz4-rkfb
109
vulnerability VCID-wshe-gf99-tbg6
110
vulnerability VCID-ww49-y35r-ykdd
111
vulnerability VCID-xfm9-e5nr-wyat
112
vulnerability VCID-xhyc-9rpu-2bc8
113
vulnerability VCID-xnfs-bpwj-3ycp
114
vulnerability VCID-xwnu-h1xh-3bg6
115
vulnerability VCID-y3k1-c4rn-xbc2
116
vulnerability VCID-yq3t-swp5-abch
117
vulnerability VCID-yz3c-arnr-y3cs
118
vulnerability VCID-zc2p-sfu7-jkhc
119
vulnerability VCID-zxet-n94k-57ge
120
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-13%252Bdeb7u6
aliases CVE-2012-0031
risk_score 4.2
exploitability 2.0
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ym93-sxb8-fkdm
135
url VCID-yq3t-swp5-abch
vulnerability_id VCID-yq3t-swp5-abch
summary httpd: SetEnvIf resource exhaustion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4415.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4415.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4415
reference_id
reference_type
scores
0
value 0.00453
scoring_system epss
scoring_elements 0.63702
published_at 2026-04-01T12:55:00Z
1
value 0.00453
scoring_system epss
scoring_elements 0.63763
published_at 2026-04-02T12:55:00Z
2
value 0.00453
scoring_system epss
scoring_elements 0.63789
published_at 2026-04-04T12:55:00Z
3
value 0.00453
scoring_system epss
scoring_elements 0.63746
published_at 2026-04-07T12:55:00Z
4
value 0.00453
scoring_system epss
scoring_elements 0.63797
published_at 2026-04-08T12:55:00Z
5
value 0.00453
scoring_system epss
scoring_elements 0.63815
published_at 2026-04-09T12:55:00Z
6
value 0.00453
scoring_system epss
scoring_elements 0.63828
published_at 2026-04-11T12:55:00Z
7
value 0.00453
scoring_system epss
scoring_elements 0.63814
published_at 2026-04-12T12:55:00Z
8
value 0.00453
scoring_system epss
scoring_elements 0.63781
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4415
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4415
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4415
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=750935
reference_id 750935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=750935
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10
purl pkg:deb/debian/apache2@2.4.10-10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10
aliases CVE-2011-4415
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq3t-swp5-abch
136
url VCID-yz3c-arnr-y3cs
vulnerability_id VCID-yz3c-arnr-y3cs
summary
In Apache HTTP Server versions 2.4.20 to 2.4.43, when trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools.
Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11993.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11993
reference_id
reference_type
scores
0
value 0.33361
scoring_system epss
scoring_elements 0.96887
published_at 2026-04-01T12:55:00Z
1
value 0.33361
scoring_system epss
scoring_elements 0.96919
published_at 2026-04-13T12:55:00Z
2
value 0.33361
scoring_system epss
scoring_elements 0.96916
published_at 2026-04-11T12:55:00Z
3
value 0.33361
scoring_system epss
scoring_elements 0.96918
published_at 2026-04-12T12:55:00Z
4
value 0.33361
scoring_system epss
scoring_elements 0.96894
published_at 2026-04-02T12:55:00Z
5
value 0.33361
scoring_system epss
scoring_elements 0.96899
published_at 2026-04-04T12:55:00Z
6
value 0.33361
scoring_system epss
scoring_elements 0.96904
published_at 2026-04-07T12:55:00Z
7
value 0.33361
scoring_system epss
scoring_elements 0.96912
published_at 2026-04-08T12:55:00Z
8
value 0.33361
scoring_system epss
scoring_elements 0.96914
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11984
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1866564
reference_id 1866564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1866564
9
reference_url https://httpd.apache.org/security/json/CVE-2020-11993.json
reference_id CVE-2020-11993
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2020-11993.json
10
reference_url https://security.gentoo.org/glsa/202008-04
reference_id GLSA-202008-04
reference_type
scores
url https://security.gentoo.org/glsa/202008-04
11
reference_url https://access.redhat.com/errata/RHSA-2020:4383
reference_id RHSA-2020:4383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4383
12
reference_url https://access.redhat.com/errata/RHSA-2020:4384
reference_id RHSA-2020:4384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4384
13
reference_url https://access.redhat.com/errata/RHSA-2021:1809
reference_id RHSA-2021:1809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1809
14
reference_url https://usn.ubuntu.com/4458-1/
reference_id USN-4458-1
reference_type
scores
url https://usn.ubuntu.com/4458-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2d8p-bbc1-hkfa
1
vulnerability VCID-3ay7-bwah-2yd1
2
vulnerability VCID-9tez-97xg-z3bs
3
vulnerability VCID-b9ks-detx-nkdw
4
vulnerability VCID-fsh3-7b9j-dfgf
5
vulnerability VCID-ha7f-21gy-3qa2
6
vulnerability VCID-r471-g9xs-sbga
7
vulnerability VCID-td8g-tmny-jyaa
8
vulnerability VCID-varh-ysfr-euc8
9
vulnerability VCID-ww49-y35r-ykdd
10
vulnerability VCID-zxet-n94k-57ge
11
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1
aliases CVE-2020-11993
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yz3c-arnr-y3cs
137
url VCID-zc2p-sfu7-jkhc
vulnerability_id VCID-zc2p-sfu7-jkhc
summary mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15710.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15710
reference_id
reference_type
scores
0
value 0.08002
scoring_system epss
scoring_elements 0.92065
published_at 2026-04-01T12:55:00Z
1
value 0.08002
scoring_system epss
scoring_elements 0.92105
published_at 2026-04-12T12:55:00Z
2
value 0.08002
scoring_system epss
scoring_elements 0.92097
published_at 2026-04-08T12:55:00Z
3
value 0.08002
scoring_system epss
scoring_elements 0.921
published_at 2026-04-13T12:55:00Z
4
value 0.08002
scoring_system epss
scoring_elements 0.92104
published_at 2026-04-11T12:55:00Z
5
value 0.08002
scoring_system epss
scoring_elements 0.92072
published_at 2026-04-02T12:55:00Z
6
value 0.08002
scoring_system epss
scoring_elements 0.9208
published_at 2026-04-04T12:55:00Z
7
value 0.08002
scoring_system epss
scoring_elements 0.92085
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560599
reference_id 1560599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560599
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2017-15710.json
reference_id CVE-2017-15710
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-15710.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:1121
reference_id RHSA-2020:1121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1121
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
18
reference_url https://usn.ubuntu.com/3937-2/
reference_id USN-3937-2
reference_type
scores
url https://usn.ubuntu.com/3937-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
purl pkg:deb/debian/apache2@2.4.10-10%2Bdeb8u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-2nmh-7tfa-zyb2
5
vulnerability VCID-2xc4-7zg9-y7fw
6
vulnerability VCID-3ay7-bwah-2yd1
7
vulnerability VCID-3djp-gq4c-1fa9
8
vulnerability VCID-3wuk-hwg1-6fa6
9
vulnerability VCID-4c3m-m6ku-kbhq
10
vulnerability VCID-4d3t-es7p-9qhn
11
vulnerability VCID-4sss-a8ne-kqbc
12
vulnerability VCID-5bej-9h7w-33c8
13
vulnerability VCID-5xrt-1n1q-4bey
14
vulnerability VCID-66k7-maf9-dfcd
15
vulnerability VCID-6b7y-562y-suce
16
vulnerability VCID-6qk8-1cj1-4fh7
17
vulnerability VCID-6tgh-b4td-63f5
18
vulnerability VCID-6vxq-uxxw-ybeh
19
vulnerability VCID-7u2r-egf2-vfhx
20
vulnerability VCID-7vfk-1dwm-xbbt
21
vulnerability VCID-7vjg-vetg-p7f6
22
vulnerability VCID-7zer-dq7c-8ffq
23
vulnerability VCID-8edq-8rvq-rkf1
24
vulnerability VCID-8gcm-7q3n-q7bm
25
vulnerability VCID-8nw9-zpxn-ckab
26
vulnerability VCID-9qdr-1v39-d7b7
27
vulnerability VCID-9tez-97xg-z3bs
28
vulnerability VCID-9u53-b79b-cfgd
29
vulnerability VCID-9vzm-qtye-ufh2
30
vulnerability VCID-9ych-ybpr-j3h6
31
vulnerability VCID-a9rw-3s1y-hqd7
32
vulnerability VCID-apfh-r85v-dbhz
33
vulnerability VCID-auhk-ppv5-buaa
34
vulnerability VCID-b68y-4prb-bfdk
35
vulnerability VCID-b9ks-detx-nkdw
36
vulnerability VCID-bau7-pme5-ckbt
37
vulnerability VCID-bvkg-nrwd-e7g8
38
vulnerability VCID-cqjv-6m9n-mfeq
39
vulnerability VCID-ct26-19cq-8kd7
40
vulnerability VCID-d36c-rrxh-ybgv
41
vulnerability VCID-db6k-j9mj-e7hy
42
vulnerability VCID-e3jc-83a7-8uhh
43
vulnerability VCID-edvy-cern-6kcu
44
vulnerability VCID-eesz-v6ae-gya3
45
vulnerability VCID-ehv1-yvpu-ubcg
46
vulnerability VCID-ej7y-7na3-5qby
47
vulnerability VCID-f2y3-s6j8-7ygr
48
vulnerability VCID-fqem-96w3-rucb
49
vulnerability VCID-fsh3-7b9j-dfgf
50
vulnerability VCID-ftjw-9fb6-d3cw
51
vulnerability VCID-fyrq-yg2u-jkc7
52
vulnerability VCID-fz8c-b8r4-1yb8
53
vulnerability VCID-g55m-t4s1-nfhv
54
vulnerability VCID-g6xr-qtwz-2yaq
55
vulnerability VCID-gv84-vfvh-y7hu
56
vulnerability VCID-h6kk-81jx-h7b8
57
vulnerability VCID-ha7f-21gy-3qa2
58
vulnerability VCID-hm3f-m22n-u3gy
59
vulnerability VCID-htfx-mahy-9kde
60
vulnerability VCID-jt89-ruvk-1kbj
61
vulnerability VCID-jzuw-73df-mfff
62
vulnerability VCID-k4kb-21tp-4kc8
63
vulnerability VCID-k4nk-qqxg-s7e6
64
vulnerability VCID-kkuy-1j91-9bb2
65
vulnerability VCID-kv7f-t14h-2bfv
66
vulnerability VCID-mtg7-8556-kbgd
67
vulnerability VCID-na94-5565-dyfc
68
vulnerability VCID-p2a1-afnh-7qca
69
vulnerability VCID-pc2n-ga7g-byga
70
vulnerability VCID-pjxs-hnjr-duey
71
vulnerability VCID-pnc8-bb23-vqh1
72
vulnerability VCID-pz6f-mahv-hue8
73
vulnerability VCID-q5wm-suxb-jfeb
74
vulnerability VCID-qayj-kts9-3fde
75
vulnerability VCID-qc9j-x576-ayc1
76
vulnerability VCID-qjeh-n57t-y7g5
77
vulnerability VCID-qm7e-n9ay-hufy
78
vulnerability VCID-r2pc-wuzb-h7hk
79
vulnerability VCID-r471-g9xs-sbga
80
vulnerability VCID-rdtq-8ng5-53fn
81
vulnerability VCID-rfqy-e7pv-dyfy
82
vulnerability VCID-scf1-zmu7-e3b2
83
vulnerability VCID-t67v-c4gx-ukbj
84
vulnerability VCID-td8g-tmny-jyaa
85
vulnerability VCID-tkm7-pyue-7ffj
86
vulnerability VCID-twj7-4qwm-2khv
87
vulnerability VCID-ugdv-apr8-g3bz
88
vulnerability VCID-uwqg-yytc-vfae
89
vulnerability VCID-v41h-pbbe-zfas
90
vulnerability VCID-varh-ysfr-euc8
91
vulnerability VCID-w6p6-u8ku-k3f6
92
vulnerability VCID-wgte-97r1-j7a9
93
vulnerability VCID-wrw6-uzz4-rkfb
94
vulnerability VCID-wshe-gf99-tbg6
95
vulnerability VCID-ww49-y35r-ykdd
96
vulnerability VCID-xfm9-e5nr-wyat
97
vulnerability VCID-xhyc-9rpu-2bc8
98
vulnerability VCID-xnfs-bpwj-3ycp
99
vulnerability VCID-xwnu-h1xh-3bg6
100
vulnerability VCID-y3k1-c4rn-xbc2
101
vulnerability VCID-yz3c-arnr-y3cs
102
vulnerability VCID-zc2p-sfu7-jkhc
103
vulnerability VCID-zxet-n94k-57ge
104
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.10-10%252Bdeb8u12
1
url pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
purl pkg:deb/debian/apache2@2.4.25-3%2Bdeb9u9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1189-ej89-hybs
1
vulnerability VCID-17hy-4ppt-xyhw
2
vulnerability VCID-2d8p-bbc1-hkfa
3
vulnerability VCID-2e6w-fs4j-17g9
4
vulnerability VCID-3ay7-bwah-2yd1
5
vulnerability VCID-3djp-gq4c-1fa9
6
vulnerability VCID-4c3m-m6ku-kbhq
7
vulnerability VCID-4d3t-es7p-9qhn
8
vulnerability VCID-4sss-a8ne-kqbc
9
vulnerability VCID-5bej-9h7w-33c8
10
vulnerability VCID-5xrt-1n1q-4bey
11
vulnerability VCID-66k7-maf9-dfcd
12
vulnerability VCID-6b7y-562y-suce
13
vulnerability VCID-6qk8-1cj1-4fh7
14
vulnerability VCID-6tgh-b4td-63f5
15
vulnerability VCID-6vxq-uxxw-ybeh
16
vulnerability VCID-7u2r-egf2-vfhx
17
vulnerability VCID-7vfk-1dwm-xbbt
18
vulnerability VCID-7vjg-vetg-p7f6
19
vulnerability VCID-8edq-8rvq-rkf1
20
vulnerability VCID-8nw9-zpxn-ckab
21
vulnerability VCID-9qdr-1v39-d7b7
22
vulnerability VCID-9tez-97xg-z3bs
23
vulnerability VCID-9u53-b79b-cfgd
24
vulnerability VCID-9vzm-qtye-ufh2
25
vulnerability VCID-9ych-ybpr-j3h6
26
vulnerability VCID-a9rw-3s1y-hqd7
27
vulnerability VCID-apfh-r85v-dbhz
28
vulnerability VCID-auhk-ppv5-buaa
29
vulnerability VCID-b68y-4prb-bfdk
30
vulnerability VCID-b9ks-detx-nkdw
31
vulnerability VCID-bau7-pme5-ckbt
32
vulnerability VCID-bvkg-nrwd-e7g8
33
vulnerability VCID-cqjv-6m9n-mfeq
34
vulnerability VCID-ct26-19cq-8kd7
35
vulnerability VCID-d36c-rrxh-ybgv
36
vulnerability VCID-db6k-j9mj-e7hy
37
vulnerability VCID-e3jc-83a7-8uhh
38
vulnerability VCID-edvy-cern-6kcu
39
vulnerability VCID-eesz-v6ae-gya3
40
vulnerability VCID-ehv1-yvpu-ubcg
41
vulnerability VCID-ej7y-7na3-5qby
42
vulnerability VCID-f2y3-s6j8-7ygr
43
vulnerability VCID-fqem-96w3-rucb
44
vulnerability VCID-fsh3-7b9j-dfgf
45
vulnerability VCID-ftjw-9fb6-d3cw
46
vulnerability VCID-fyrq-yg2u-jkc7
47
vulnerability VCID-fz8c-b8r4-1yb8
48
vulnerability VCID-g55m-t4s1-nfhv
49
vulnerability VCID-g6xr-qtwz-2yaq
50
vulnerability VCID-gv84-vfvh-y7hu
51
vulnerability VCID-h6kk-81jx-h7b8
52
vulnerability VCID-ha7f-21gy-3qa2
53
vulnerability VCID-hm3f-m22n-u3gy
54
vulnerability VCID-htfx-mahy-9kde
55
vulnerability VCID-jt89-ruvk-1kbj
56
vulnerability VCID-jzuw-73df-mfff
57
vulnerability VCID-k4nk-qqxg-s7e6
58
vulnerability VCID-kkuy-1j91-9bb2
59
vulnerability VCID-mtg7-8556-kbgd
60
vulnerability VCID-na94-5565-dyfc
61
vulnerability VCID-p2a1-afnh-7qca
62
vulnerability VCID-pjxs-hnjr-duey
63
vulnerability VCID-pnc8-bb23-vqh1
64
vulnerability VCID-pz6f-mahv-hue8
65
vulnerability VCID-q5wm-suxb-jfeb
66
vulnerability VCID-qayj-kts9-3fde
67
vulnerability VCID-qc9j-x576-ayc1
68
vulnerability VCID-qjeh-n57t-y7g5
69
vulnerability VCID-qm7e-n9ay-hufy
70
vulnerability VCID-r2pc-wuzb-h7hk
71
vulnerability VCID-r471-g9xs-sbga
72
vulnerability VCID-rdtq-8ng5-53fn
73
vulnerability VCID-scf1-zmu7-e3b2
74
vulnerability VCID-t67v-c4gx-ukbj
75
vulnerability VCID-td8g-tmny-jyaa
76
vulnerability VCID-twj7-4qwm-2khv
77
vulnerability VCID-ugdv-apr8-g3bz
78
vulnerability VCID-uwqg-yytc-vfae
79
vulnerability VCID-v41h-pbbe-zfas
80
vulnerability VCID-varh-ysfr-euc8
81
vulnerability VCID-w6p6-u8ku-k3f6
82
vulnerability VCID-wrw6-uzz4-rkfb
83
vulnerability VCID-wshe-gf99-tbg6
84
vulnerability VCID-ww49-y35r-ykdd
85
vulnerability VCID-xfm9-e5nr-wyat
86
vulnerability VCID-xhyc-9rpu-2bc8
87
vulnerability VCID-xnfs-bpwj-3ycp
88
vulnerability VCID-xwnu-h1xh-3bg6
89
vulnerability VCID-y3k1-c4rn-xbc2
90
vulnerability VCID-yz3c-arnr-y3cs
91
vulnerability VCID-zc2p-sfu7-jkhc
92
vulnerability VCID-zxet-n94k-57ge
93
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.25-3%252Bdeb9u9
2
url pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
purl pkg:deb/debian/apache2@2.4.38-3%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17hy-4ppt-xyhw
1
vulnerability VCID-2d8p-bbc1-hkfa
2
vulnerability VCID-2e6w-fs4j-17g9
3
vulnerability VCID-3ay7-bwah-2yd1
4
vulnerability VCID-3djp-gq4c-1fa9
5
vulnerability VCID-4c3m-m6ku-kbhq
6
vulnerability VCID-4d3t-es7p-9qhn
7
vulnerability VCID-5xrt-1n1q-4bey
8
vulnerability VCID-66k7-maf9-dfcd
9
vulnerability VCID-6b7y-562y-suce
10
vulnerability VCID-6qk8-1cj1-4fh7
11
vulnerability VCID-6tgh-b4td-63f5
12
vulnerability VCID-7vfk-1dwm-xbbt
13
vulnerability VCID-8edq-8rvq-rkf1
14
vulnerability VCID-8nw9-zpxn-ckab
15
vulnerability VCID-9tez-97xg-z3bs
16
vulnerability VCID-9u53-b79b-cfgd
17
vulnerability VCID-9ych-ybpr-j3h6
18
vulnerability VCID-a9rw-3s1y-hqd7
19
vulnerability VCID-auhk-ppv5-buaa
20
vulnerability VCID-b68y-4prb-bfdk
21
vulnerability VCID-b9ks-detx-nkdw
22
vulnerability VCID-bau7-pme5-ckbt
23
vulnerability VCID-bvkg-nrwd-e7g8
24
vulnerability VCID-cqjv-6m9n-mfeq
25
vulnerability VCID-d36c-rrxh-ybgv
26
vulnerability VCID-db6k-j9mj-e7hy
27
vulnerability VCID-edvy-cern-6kcu
28
vulnerability VCID-eesz-v6ae-gya3
29
vulnerability VCID-ej7y-7na3-5qby
30
vulnerability VCID-f2y3-s6j8-7ygr
31
vulnerability VCID-fsh3-7b9j-dfgf
32
vulnerability VCID-ftjw-9fb6-d3cw
33
vulnerability VCID-fz8c-b8r4-1yb8
34
vulnerability VCID-g55m-t4s1-nfhv
35
vulnerability VCID-g6xr-qtwz-2yaq
36
vulnerability VCID-gv84-vfvh-y7hu
37
vulnerability VCID-h6kk-81jx-h7b8
38
vulnerability VCID-ha7f-21gy-3qa2
39
vulnerability VCID-hm3f-m22n-u3gy
40
vulnerability VCID-htfx-mahy-9kde
41
vulnerability VCID-k4nk-qqxg-s7e6
42
vulnerability VCID-kkuy-1j91-9bb2
43
vulnerability VCID-mtg7-8556-kbgd
44
vulnerability VCID-na94-5565-dyfc
45
vulnerability VCID-p2a1-afnh-7qca
46
vulnerability VCID-pjxs-hnjr-duey
47
vulnerability VCID-pnc8-bb23-vqh1
48
vulnerability VCID-pz6f-mahv-hue8
49
vulnerability VCID-qjeh-n57t-y7g5
50
vulnerability VCID-qm7e-n9ay-hufy
51
vulnerability VCID-r2pc-wuzb-h7hk
52
vulnerability VCID-r471-g9xs-sbga
53
vulnerability VCID-rdtq-8ng5-53fn
54
vulnerability VCID-t67v-c4gx-ukbj
55
vulnerability VCID-td8g-tmny-jyaa
56
vulnerability VCID-v41h-pbbe-zfas
57
vulnerability VCID-varh-ysfr-euc8
58
vulnerability VCID-wrw6-uzz4-rkfb
59
vulnerability VCID-ww49-y35r-ykdd
60
vulnerability VCID-xfm9-e5nr-wyat
61
vulnerability VCID-xhyc-9rpu-2bc8
62
vulnerability VCID-xnfs-bpwj-3ycp
63
vulnerability VCID-xwnu-h1xh-3bg6
64
vulnerability VCID-y3k1-c4rn-xbc2
65
vulnerability VCID-yz3c-arnr-y3cs
66
vulnerability VCID-zxet-n94k-57ge
67
vulnerability VCID-zyyh-n42k-8bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.38-3%252Bdeb10u8
aliases CVE-2017-15710
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc2p-sfu7-jkhc
138
url VCID-zxet-n94k-57ge
vulnerability_id VCID-zxet-n94k-57ge
summary
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.

Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49630.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49630
reference_id
reference_type
scores
0
value 0.01043
scoring_system epss
scoring_elements 0.77462
published_at 2026-04-13T12:55:00Z
1
value 0.01043
scoring_system epss
scoring_elements 0.77459
published_at 2026-04-09T12:55:00Z
2
value 0.01043
scoring_system epss
scoring_elements 0.77485
published_at 2026-04-11T12:55:00Z
3
value 0.01043
scoring_system epss
scoring_elements 0.77465
published_at 2026-04-12T12:55:00Z
4
value 0.01043
scoring_system epss
scoring_elements 0.77413
published_at 2026-04-02T12:55:00Z
5
value 0.01043
scoring_system epss
scoring_elements 0.77439
published_at 2026-04-04T12:55:00Z
6
value 0.01043
scoring_system epss
scoring_elements 0.77419
published_at 2026-04-07T12:55:00Z
7
value 0.01043
scoring_system epss
scoring_elements 0.7745
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49630
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49630
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374578
reference_id 2374578
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374578
5
reference_url https://httpd.apache.org/security/json/CVE-2025-49630.json
reference_id CVE-2025-49630
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-49630.json
6
reference_url https://access.redhat.com/errata/RHSA-2025:13680
reference_id RHSA-2025:13680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13680
7
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
8
reference_url https://access.redhat.com/errata/RHSA-2025:14625
reference_id RHSA-2025:14625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14625
9
reference_url https://access.redhat.com/errata/RHSA-2025:14983
reference_id RHSA-2025:14983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14983
10
reference_url https://access.redhat.com/errata/RHSA-2025:15123
reference_id RHSA-2025:15123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15123
11
reference_url https://access.redhat.com/errata/RHSA-2025:15516
reference_id RHSA-2025:15516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15516
12
reference_url https://access.redhat.com/errata/RHSA-2025:15619
reference_id RHSA-2025:15619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15619
13
reference_url https://access.redhat.com/errata/RHSA-2025:15684
reference_id RHSA-2025:15684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15684
14
reference_url https://access.redhat.com/errata/RHSA-2025:15698
reference_id RHSA-2025:15698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15698
15
reference_url https://access.redhat.com/errata/RHSA-2025:15725
reference_id RHSA-2025:15725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15725
16
reference_url https://access.redhat.com/errata/RHSA-2025:15726
reference_id RHSA-2025:15726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15726
17
reference_url https://access.redhat.com/errata/RHSA-2025:15727
reference_id RHSA-2025:15727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15727
18
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
19
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2025-49630
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxet-n94k-57ge
139
url VCID-zyyh-n42k-8bhr
vulnerability_id VCID-zyyh-n42k-8bhr
summary
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.

In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47252.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47252
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37345
published_at 2026-04-02T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37371
published_at 2026-04-04T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39845
published_at 2026-04-13T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39886
published_at 2026-04-09T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39895
published_at 2026-04-11T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39861
published_at 2026-04-12T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39817
published_at 2026-04-07T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39872
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47252
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374571
reference_id 2374571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374571
5
reference_url https://httpd.apache.org/security/json/CVE-2024-47252.json
reference_id CVE-2024-47252
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-47252.json
6
reference_url https://access.redhat.com/errata/RHSA-2025:13680
reference_id RHSA-2025:13680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13680
7
reference_url https://access.redhat.com/errata/RHSA-2025:13681
reference_id RHSA-2025:13681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13681
8
reference_url https://access.redhat.com/errata/RHSA-2025:14901
reference_id RHSA-2025:14901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14901
9
reference_url https://access.redhat.com/errata/RHSA-2025:14902
reference_id RHSA-2025:14902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14902
10
reference_url https://access.redhat.com/errata/RHSA-2025:14903
reference_id RHSA-2025:14903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14903
11
reference_url https://access.redhat.com/errata/RHSA-2025:14997
reference_id RHSA-2025:14997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14997
12
reference_url https://access.redhat.com/errata/RHSA-2025:15023
reference_id RHSA-2025:15023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15023
13
reference_url https://access.redhat.com/errata/RHSA-2025:15095
reference_id RHSA-2025:15095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15095
14
reference_url https://access.redhat.com/errata/RHSA-2025:15123
reference_id RHSA-2025:15123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15123
15
reference_url https://access.redhat.com/errata/RHSA-2025:15516
reference_id RHSA-2025:15516
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15516
16
reference_url https://access.redhat.com/errata/RHSA-2025:15619
reference_id RHSA-2025:15619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15619
17
reference_url https://access.redhat.com/errata/RHSA-2025:15684
reference_id RHSA-2025:15684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15684
18
reference_url https://access.redhat.com/errata/RHSA-2025:15698
reference_id RHSA-2025:15698
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15698
19
reference_url https://usn.ubuntu.com/7639-1/
reference_id USN-7639-1
reference_type
scores
url https://usn.ubuntu.com/7639-1/
20
reference_url https://usn.ubuntu.com/7639-2/
reference_id USN-7639-2
reference_type
scores
url https://usn.ubuntu.com/7639-2/
fixed_packages
0
url pkg:deb/debian/apache2@2.4.66-1~deb12u1
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1
aliases CVE-2024-47252
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zyyh-n42k-8bhr
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.16-6%252Bsqueeze15