Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/apache2@2.0.51?distro=trixie
Typedeb
Namespacedebian
Nameapache2
Version2.0.51
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.0.51-1
Latest_non_vulnerable_version2.4.66-8
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9xwj-xak5-efb3
vulnerability_id VCID-9xwj-xak5-efb3
summary An issue was discovered in the mod_ssl module in Apache 2.0. A remote attacker who forces an SSL connection to be aborted in a particular state may cause an Apache child process to enter an infinite loop, consuming CPU resources.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0748.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0748.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0748
reference_id
reference_type
scores
0
value 0.18763
scoring_system epss
scoring_elements 0.95292
published_at 2026-04-13T12:55:00Z
1
value 0.18763
scoring_system epss
scoring_elements 0.95251
published_at 2026-04-01T12:55:00Z
2
value 0.18763
scoring_system epss
scoring_elements 0.95264
published_at 2026-04-02T12:55:00Z
3
value 0.18763
scoring_system epss
scoring_elements 0.95269
published_at 2026-04-04T12:55:00Z
4
value 0.18763
scoring_system epss
scoring_elements 0.95274
published_at 2026-04-07T12:55:00Z
5
value 0.18763
scoring_system epss
scoring_elements 0.95281
published_at 2026-04-08T12:55:00Z
6
value 0.18763
scoring_system epss
scoring_elements 0.95284
published_at 2026-04-09T12:55:00Z
7
value 0.18763
scoring_system epss
scoring_elements 0.95289
published_at 2026-04-11T12:55:00Z
8
value 0.18763
scoring_system epss
scoring_elements 0.9529
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0748
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0748
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617262
reference_id 1617262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617262
4
reference_url https://httpd.apache.org/security/json/CVE-2004-0748.json
reference_id CVE-2004-0748
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0748.json
5
reference_url https://access.redhat.com/errata/RHSA-2004:349
reference_id RHSA-2004:349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:349
fixed_packages
0
url pkg:deb/debian/apache2@2.0.51?distro=trixie
purl pkg:deb/debian/apache2@2.0.51?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.0.51%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2004-0748
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xwj-xak5-efb3
1
url VCID-fq9j-uewn-q7h7
vulnerability_id VCID-fq9j-uewn-q7h7
summary A buffer overflow was found in the expansion of environment variables during configuration file parsing. This issue could allow a local user to gain the privileges of a httpd child if a server can be forced to parse a carefully crafted .htaccess file written by a local user.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0747.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0747
reference_id
reference_type
scores
0
value 0.01437
scoring_system epss
scoring_elements 0.80669
published_at 2026-04-04T12:55:00Z
1
value 0.01437
scoring_system epss
scoring_elements 0.80639
published_at 2026-04-01T12:55:00Z
2
value 0.01437
scoring_system epss
scoring_elements 0.80647
published_at 2026-04-02T12:55:00Z
3
value 0.01437
scoring_system epss
scoring_elements 0.80697
published_at 2026-04-13T12:55:00Z
4
value 0.01437
scoring_system epss
scoring_elements 0.80705
published_at 2026-04-12T12:55:00Z
5
value 0.01437
scoring_system epss
scoring_elements 0.80719
published_at 2026-04-11T12:55:00Z
6
value 0.01437
scoring_system epss
scoring_elements 0.80702
published_at 2026-04-09T12:55:00Z
7
value 0.01437
scoring_system epss
scoring_elements 0.80692
published_at 2026-04-08T12:55:00Z
8
value 0.01437
scoring_system epss
scoring_elements 0.80664
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747
3
reference_url http://www.trustix.org/errata/2004/0047/
reference_id 0047
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.trustix.org/errata/2004/0047/
4
reference_url http://www.vupen.com/english/advisories/2009/1233
reference_id 1233
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.vupen.com/english/advisories/2009/1233
5
reference_url http://secunia.com/advisories/12540
reference_id 12540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://secunia.com/advisories/12540
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617261
reference_id 1617261
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617261
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17384
reference_id 17384
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17384
8
reference_url http://www.novell.com/linux/security/advisories/2004_32_apache2.html
reference_id 2004_32_apache2.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.novell.com/linux/security/advisories/2004_32_apache2.html
9
reference_url http://secunia.com/advisories/34920
reference_id 34920
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://secunia.com/advisories/34920
10
reference_url http://www.kb.cert.org/vuls/id/481998
reference_id 481998
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.kb.cert.org/vuls/id/481998
11
reference_url http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096
reference_id advisory.php?name=MDKSA-2004:096
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096
12
reference_url https://httpd.apache.org/security/json/CVE-2004-0747.json
reference_id CVE-2004-0747
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0747.json
13
reference_url http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml
reference_id glsa-200409-21.xml
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml
14
reference_url http://securitytracker.com/id?1011303
reference_id id?1011303
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://securitytracker.com/id?1011303
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561
reference_id oval%3Aorg.mitre.oval%3Adef%3A11561
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561
16
reference_url http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
reference_id phpsupcontent?contentID=205147
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
17
reference_url https://access.redhat.com/errata/RHSA-2004:463
reference_id RHSA-2004:463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:463
18
reference_url http://www.redhat.com/support/errata/RHSA-2004-463.html
reference_id RHSA-2004-463.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.redhat.com/support/errata/RHSA-2004-463.html
fixed_packages
0
url pkg:deb/debian/apache2@2.0.51?distro=trixie
purl pkg:deb/debian/apache2@2.0.51?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.0.51%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2004-0747
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fq9j-uewn-q7h7
2
url VCID-g1jc-8vza-u3ad
vulnerability_id VCID-g1jc-8vza-u3ad
summary Testing using the Codenomicon HTTP Test Tool performed by the Apache Software Foundation security group and Red Hat uncovered an input validation issue in the IPv6 URI parsing routines in the apr-util library. If a remote attacker sent a request including a carefully crafted URI, an httpd child process could be made to crash. One some BSD systems it is believed this flaw may be able to lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0786.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0786
reference_id
reference_type
scores
0
value 0.48362
scoring_system epss
scoring_elements 0.97742
published_at 2026-04-13T12:55:00Z
1
value 0.48362
scoring_system epss
scoring_elements 0.97719
published_at 2026-04-01T12:55:00Z
2
value 0.48362
scoring_system epss
scoring_elements 0.97726
published_at 2026-04-02T12:55:00Z
3
value 0.48362
scoring_system epss
scoring_elements 0.97728
published_at 2026-04-07T12:55:00Z
4
value 0.48362
scoring_system epss
scoring_elements 0.97733
published_at 2026-04-08T12:55:00Z
5
value 0.48362
scoring_system epss
scoring_elements 0.97736
published_at 2026-04-09T12:55:00Z
6
value 0.48362
scoring_system epss
scoring_elements 0.97739
published_at 2026-04-11T12:55:00Z
7
value 0.48362
scoring_system epss
scoring_elements 0.97741
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0786
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0786
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617289
reference_id 1617289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617289
4
reference_url https://httpd.apache.org/security/json/CVE-2004-0786.json
reference_id CVE-2004-0786
reference_type
scores
0
value critical
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0786.json
5
reference_url https://access.redhat.com/errata/RHSA-2004:463
reference_id RHSA-2004:463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:463
fixed_packages
0
url pkg:deb/debian/apache2@2.0.51?distro=trixie
purl pkg:deb/debian/apache2@2.0.51?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.0.51%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2004-0786
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1jc-8vza-u3ad
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.0.51%3Fdistro=trixie