Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/apache2@2.0.46?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | apache2 |
| Version | 2.0.46 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 2.0.47 |
| Latest_non_vulnerable_version | 2.4.66-8 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-a86d-f4nd-eqhh |
| vulnerability_id |
VCID-a86d-f4nd-eqhh |
| summary |
Apache did not filter terminal escape sequences from its access logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0083 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.93908 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.93842 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.93851 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.9386 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.93863 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.93871 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.93875 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.9388 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.93901 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.12356 |
| scoring_system |
epss |
| scoring_elements |
0.93907 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0083 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0083
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a86d-f4nd-eqhh |
|
| 1 |
| url |
VCID-brn7-nskr-7fcq |
| vulnerability_id |
VCID-brn7-nskr-7fcq |
| summary |
Apache on OS2 up to and including Apache 2.0.45 have a Denial of Service vulnerability caused by device names. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0134 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.9025 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90192 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90195 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90207 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90212 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90228 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90234 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90241 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90236 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90253 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.05508 |
| scoring_system |
epss |
| scoring_elements |
0.90254 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0134 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0134
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-brn7-nskr-7fcq |
|
| 2 |
| url |
VCID-tbdg-kev6-5uep |
| vulnerability_id |
VCID-tbdg-kev6-5uep |
| summary |
A vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0245 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.84076 |
| scoring_system |
epss |
| scoring_elements |
0.9931 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.84076 |
| scoring_system |
epss |
| scoring_elements |
0.99307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.84076 |
| scoring_system |
epss |
| scoring_elements |
0.99308 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.84076 |
| scoring_system |
epss |
| scoring_elements |
0.99309 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.85319 |
| scoring_system |
epss |
| scoring_elements |
0.9936 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.85319 |
| scoring_system |
epss |
| scoring_elements |
0.99361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.85319 |
| scoring_system |
epss |
| scoring_elements |
0.99355 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.85319 |
| scoring_system |
epss |
| scoring_elements |
0.99357 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.85319 |
| scoring_system |
epss |
| scoring_elements |
0.99359 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0245 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0245
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tbdg-kev6-5uep |
|
| 3 |
| url |
VCID-w18t-67us-kufe |
| vulnerability_id |
VCID-w18t-67us-kufe |
| summary |
A build system problem in Apache 2.0.40 through 2.0.45 allows remote attackers to cause a denial of access to authenticated content when a threaded server is used. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0189 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16257 |
| scoring_system |
epss |
| scoring_elements |
0.94818 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.16257 |
| scoring_system |
epss |
| scoring_elements |
0.9479 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.16257 |
| scoring_system |
epss |
| scoring_elements |
0.94799 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.16257 |
| scoring_system |
epss |
| scoring_elements |
0.94803 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.16257 |
| scoring_system |
epss |
| scoring_elements |
0.94804 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.16257 |
| scoring_system |
epss |
| scoring_elements |
0.94813 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.17927 |
| scoring_system |
epss |
| scoring_elements |
0.95162 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.17927 |
| scoring_system |
epss |
| scoring_elements |
0.95144 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.17927 |
| scoring_system |
epss |
| scoring_elements |
0.95146 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.17927 |
| scoring_system |
epss |
| scoring_elements |
0.95149 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.17927 |
| scoring_system |
epss |
| scoring_elements |
0.95156 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.17927 |
| scoring_system |
epss |
| scoring_elements |
0.9516 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0189 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0189
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w18t-67us-kufe |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.0.46%3Fdistro=trixie |