Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/apache2@2.2.22-1?distro=trixie
Typedeb
Namespacedebian
Nameapache2
Version2.2.22-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.2.22-4
Latest_non_vulnerable_version2.4.66-8
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-53da-z9gn-n7f2
vulnerability_id VCID-53da-z9gn-n7f2
summary A flaw was found in mod_log_config. If the '%{cookiename}C' log format string is in use, a remote attacker could send a specific cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0021.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0021
reference_id
reference_type
scores
0
value 0.3296
scoring_system epss
scoring_elements 0.9689
published_at 2026-04-13T12:55:00Z
1
value 0.3296
scoring_system epss
scoring_elements 0.96858
published_at 2026-04-01T12:55:00Z
2
value 0.3296
scoring_system epss
scoring_elements 0.96866
published_at 2026-04-02T12:55:00Z
3
value 0.3296
scoring_system epss
scoring_elements 0.96871
published_at 2026-04-04T12:55:00Z
4
value 0.3296
scoring_system epss
scoring_elements 0.96875
published_at 2026-04-07T12:55:00Z
5
value 0.3296
scoring_system epss
scoring_elements 0.96884
published_at 2026-04-08T12:55:00Z
6
value 0.3296
scoring_system epss
scoring_elements 0.96885
published_at 2026-04-09T12:55:00Z
7
value 0.3296
scoring_system epss
scoring_elements 0.96888
published_at 2026-04-11T12:55:00Z
8
value 0.3296
scoring_system epss
scoring_elements 0.96889
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0021
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785065
reference_id 785065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785065
4
reference_url https://httpd.apache.org/security/json/CVE-2012-0021.json
reference_id CVE-2012-0021
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0021.json
5
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
6
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
7
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
8
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-1?distro=trixie
purl pkg:deb/debian/apache2@2.2.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-1%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2012-0021
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53da-z9gn-n7f2
1
url VCID-d4rc-pnv5-6uc8
vulnerability_id VCID-d4rc-pnv5-6uc8
summary A flaw was found in the default error response for status code 400. This flaw could be used by an attacker to expose "httpOnly" cookies when no custom ErrorDocument is specified.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0053.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0053
reference_id
reference_type
scores
0
value 0.55955
scoring_system epss
scoring_elements 0.98088
published_at 2026-04-07T12:55:00Z
1
value 0.55955
scoring_system epss
scoring_elements 0.98081
published_at 2026-04-01T12:55:00Z
2
value 0.55955
scoring_system epss
scoring_elements 0.98084
published_at 2026-04-02T12:55:00Z
3
value 0.55955
scoring_system epss
scoring_elements 0.981
published_at 2026-04-13T12:55:00Z
4
value 0.55955
scoring_system epss
scoring_elements 0.98093
published_at 2026-04-09T12:55:00Z
5
value 0.55955
scoring_system epss
scoring_elements 0.98099
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785069
reference_id 785069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785069
4
reference_url https://httpd.apache.org/security/json/CVE-2012-0053.json
reference_id CVE-2012-0053
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0053.json
5
reference_url https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08
reference_id CVE-2012-0053;OSVDB-78556
reference_type exploit
scores
url https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/18442.html
reference_id CVE-2012-0053;OSVDB-78556
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/18442.html
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
10
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
11
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
12
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-1?distro=trixie
purl pkg:deb/debian/apache2@2.2.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-1%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2012-0053
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4rc-pnv5-6uc8
2
url VCID-n9e1-c2zs-zkdk
vulnerability_id VCID-n9e1-c2zs-zkdk
summary A flaw was found when mod_proxy_ajp connects to a backend server that takes too long to respond. Given a specific configuration, a remote attacker could send certain requests, putting a backend server into an error state until the retry timeout expired. This could lead to a temporary denial of service.
references
0
reference_url http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html#2.2.22
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html
3
reference_url http://marc.info/?l=bugtraq&m=136612293908376&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136612293908376&w=2
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4557.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4557.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4557
reference_id
reference_type
scores
0
value 0.25967
scoring_system epss
scoring_elements 0.96274
published_at 2026-04-13T12:55:00Z
1
value 0.25967
scoring_system epss
scoring_elements 0.96235
published_at 2026-04-01T12:55:00Z
2
value 0.25967
scoring_system epss
scoring_elements 0.96266
published_at 2026-04-09T12:55:00Z
3
value 0.25967
scoring_system epss
scoring_elements 0.9627
published_at 2026-04-12T12:55:00Z
4
value 0.25967
scoring_system epss
scoring_elements 0.96242
published_at 2026-04-02T12:55:00Z
5
value 0.25967
scoring_system epss
scoring_elements 0.9625
published_at 2026-04-04T12:55:00Z
6
value 0.25967
scoring_system epss
scoring_elements 0.96254
published_at 2026-04-07T12:55:00Z
7
value 0.25967
scoring_system epss
scoring_elements 0.96263
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4557
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4557
7
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18938
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19284
23
reference_url http://svn.apache.org/viewvc?view=revision&revision=1227298
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=revision&revision=1227298
24
reference_url http://www.debian.org/security/2012/dsa-2579
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2579
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=871685
reference_id 871685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=871685
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
36
reference_url https://httpd.apache.org/security/json/CVE-2012-4557.json
reference_id CVE-2012-4557
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-4557.json
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4557
reference_id CVE-2012-4557
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4557
38
reference_url https://access.redhat.com/errata/RHSA-2013:0512
reference_id RHSA-2013:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0512
39
reference_url https://usn.ubuntu.com/1765-1/
reference_id USN-1765-1
reference_type
scores
url https://usn.ubuntu.com/1765-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-1?distro=trixie
purl pkg:deb/debian/apache2@2.2.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-1%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2012-4557
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n9e1-c2zs-zkdk
3
url VCID-ym93-sxb8-fkdm
vulnerability_id VCID-ym93-sxb8-fkdm
summary A flaw was found in the handling of the scoreboard. An unprivileged child process could cause the parent process to crash at shutdown rather than terminate cleanly.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0031.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0031.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0031
reference_id
reference_type
scores
0
value 0.01196
scoring_system epss
scoring_elements 0.78884
published_at 2026-04-13T12:55:00Z
1
value 0.01196
scoring_system epss
scoring_elements 0.78837
published_at 2026-04-01T12:55:00Z
2
value 0.01196
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-02T12:55:00Z
3
value 0.01196
scoring_system epss
scoring_elements 0.78872
published_at 2026-04-04T12:55:00Z
4
value 0.01196
scoring_system epss
scoring_elements 0.78854
published_at 2026-04-07T12:55:00Z
5
value 0.01196
scoring_system epss
scoring_elements 0.78879
published_at 2026-04-08T12:55:00Z
6
value 0.01196
scoring_system epss
scoring_elements 0.78886
published_at 2026-04-09T12:55:00Z
7
value 0.01196
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-11T12:55:00Z
8
value 0.01196
scoring_system epss
scoring_elements 0.78893
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0031
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=773744
reference_id 773744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=773744
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41768.txt
reference_id CVE-2012-0031
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41768.txt
5
reference_url https://httpd.apache.org/security/json/CVE-2012-0031.json
reference_id CVE-2012-0031
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0031.json
6
reference_url http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/
reference_id CVE-2012-0031
reference_type exploit
scores
url http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
10
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
11
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
12
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.22-1?distro=trixie
purl pkg:deb/debian/apache2@2.2.22-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-1%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2012-0031
risk_score 4.2
exploitability 2.0
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ym93-sxb8-fkdm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.22-1%3Fdistro=trixie