Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/apache2@2.2.9-1?distro=trixie
Typedeb
Namespacedebian
Nameapache2
Version2.2.9-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.2.9-7
Latest_non_vulnerable_version2.4.66-8
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-fn5k-e2jr-6ube
vulnerability_id VCID-fn5k-e2jr-6ube
summary A flaw was found in the handling of excessive interim responses from an origin server when using mod_proxy_http. A remote attacker could cause a denial of service or high memory usage.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
1
reference_url http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
4
reference_url http://marc.info/?l=bugtraq&m=123376588623823&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=123376588623823&w=2
5
reference_url http://marc.info/?l=bugtraq&m=125631037611762&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=125631037611762&w=2
6
reference_url http://rhn.redhat.com/errata/RHSA-2008-0967.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2008-0967.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2364.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2364.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-2364
reference_id
reference_type
scores
0
value 0.02213
scoring_system epss
scoring_elements 0.84483
published_at 2026-04-18T12:55:00Z
1
value 0.02213
scoring_system epss
scoring_elements 0.84465
published_at 2026-04-12T12:55:00Z
2
value 0.02213
scoring_system epss
scoring_elements 0.84461
published_at 2026-04-13T12:55:00Z
3
value 0.02213
scoring_system epss
scoring_elements 0.84389
published_at 2026-04-01T12:55:00Z
4
value 0.02213
scoring_system epss
scoring_elements 0.84404
published_at 2026-04-02T12:55:00Z
5
value 0.02213
scoring_system epss
scoring_elements 0.84424
published_at 2026-04-04T12:55:00Z
6
value 0.02213
scoring_system epss
scoring_elements 0.84426
published_at 2026-04-07T12:55:00Z
7
value 0.02213
scoring_system epss
scoring_elements 0.84448
published_at 2026-04-08T12:55:00Z
8
value 0.02213
scoring_system epss
scoring_elements 0.84453
published_at 2026-04-09T12:55:00Z
9
value 0.02213
scoring_system epss
scoring_elements 0.84471
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-2364
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364
10
reference_url http://secunia.com/advisories/30621
reference_id
reference_type
scores
url http://secunia.com/advisories/30621
11
reference_url http://secunia.com/advisories/31026
reference_id
reference_type
scores
url http://secunia.com/advisories/31026
12
reference_url http://secunia.com/advisories/31404
reference_id
reference_type
scores
url http://secunia.com/advisories/31404
13
reference_url http://secunia.com/advisories/31416
reference_id
reference_type
scores
url http://secunia.com/advisories/31416
14
reference_url http://secunia.com/advisories/31651
reference_id
reference_type
scores
url http://secunia.com/advisories/31651
15
reference_url http://secunia.com/advisories/31904
reference_id
reference_type
scores
url http://secunia.com/advisories/31904
16
reference_url http://secunia.com/advisories/32222
reference_id
reference_type
scores
url http://secunia.com/advisories/32222
17
reference_url http://secunia.com/advisories/32685
reference_id
reference_type
scores
url http://secunia.com/advisories/32685
18
reference_url http://secunia.com/advisories/32838
reference_id
reference_type
scores
url http://secunia.com/advisories/32838
19
reference_url http://secunia.com/advisories/33156
reference_id
reference_type
scores
url http://secunia.com/advisories/33156
20
reference_url http://secunia.com/advisories/33797
reference_id
reference_type
scores
url http://secunia.com/advisories/33797
21
reference_url http://secunia.com/advisories/34219
reference_id
reference_type
scores
url http://secunia.com/advisories/34219
22
reference_url http://secunia.com/advisories/34259
reference_id
reference_type
scores
url http://secunia.com/advisories/34259
23
reference_url http://secunia.com/advisories/34418
reference_id
reference_type
scores
url http://secunia.com/advisories/34418
24
reference_url http://security.gentoo.org/glsa/glsa-200807-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200807-06.xml
25
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/42987
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/42987
26
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E
36
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
37
reference_url https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E
38
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
39
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
40
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
44
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
45
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11713
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11713
46
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6084
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6084
47
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9577
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9577
48
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1
49
reference_url http://support.apple.com/kb/HT3216
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3216
50
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&r2=666153&pathrev=666154
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&r2=666153&pathrev=666154
51
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00055.html
52
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00153.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00153.html
53
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328
54
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg27008517
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg27008517
55
reference_url http://www-1.ibm.com/support/docview.wss?uid=swg1PK67579
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=swg1PK67579
56
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:195
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:195
57
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:237
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:237
58
reference_url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
59
reference_url http://www.redhat.com/support/errata/RHSA-2008-0966.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0966.html
60
reference_url http://www.securityfocus.com/archive/1/494858/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/494858/100/0/threaded
61
reference_url http://www.securityfocus.com/archive/1/498567/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/498567/100/0/threaded
62
reference_url http://www.securityfocus.com/bid/29653
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29653
63
reference_url http://www.securityfocus.com/bid/31681
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31681
64
reference_url http://www.securitytracker.com/id?1020267
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020267
65
reference_url http://www.ubuntu.com/usn/USN-731-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-731-1
66
reference_url http://www.vupen.com/english/advisories/2008/1798
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1798
67
reference_url http://www.vupen.com/english/advisories/2008/2780
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2780
68
reference_url http://www.vupen.com/english/advisories/2009/0320
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0320
69
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=451615
reference_id 451615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=451615
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
87
reference_url https://httpd.apache.org/security/json/CVE-2008-2364.json
reference_id CVE-2008-2364
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2008-2364.json
88
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-2364
reference_id CVE-2008-2364
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-2364
89
reference_url https://security.gentoo.org/glsa/200807-06
reference_id GLSA-200807-06
reference_type
scores
url https://security.gentoo.org/glsa/200807-06
90
reference_url https://access.redhat.com/errata/RHSA-2008:0967
reference_id RHSA-2008:0967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0967
91
reference_url https://usn.ubuntu.com/731-1/
reference_id USN-731-1
reference_type
scores
url https://usn.ubuntu.com/731-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.9-1?distro=trixie
purl pkg:deb/debian/apache2@2.2.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.9-1%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2008-2364
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fn5k-e2jr-6ube
1
url VCID-svyk-az69-qbfw
vulnerability_id VCID-svyk-az69-qbfw
summary The mod_proxy_balancer provided an administrative interface that could be vulnerable to cross-site request forgery (CSRF) attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6420.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6420
reference_id
reference_type
scores
0
value 0.05544
scoring_system epss
scoring_elements 0.90284
published_at 2026-04-18T12:55:00Z
1
value 0.05544
scoring_system epss
scoring_elements 0.90223
published_at 2026-04-01T12:55:00Z
2
value 0.05544
scoring_system epss
scoring_elements 0.90226
published_at 2026-04-02T12:55:00Z
3
value 0.05544
scoring_system epss
scoring_elements 0.90239
published_at 2026-04-04T12:55:00Z
4
value 0.05544
scoring_system epss
scoring_elements 0.90243
published_at 2026-04-07T12:55:00Z
5
value 0.05544
scoring_system epss
scoring_elements 0.90259
published_at 2026-04-08T12:55:00Z
6
value 0.05544
scoring_system epss
scoring_elements 0.90266
published_at 2026-04-09T12:55:00Z
7
value 0.05544
scoring_system epss
scoring_elements 0.90274
published_at 2026-04-11T12:55:00Z
8
value 0.05544
scoring_system epss
scoring_elements 0.90273
published_at 2026-04-12T12:55:00Z
9
value 0.05544
scoring_system epss
scoring_elements 0.90268
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=471009
reference_id 471009
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=471009
4
reference_url https://httpd.apache.org/security/json/CVE-2007-6420.json
reference_id CVE-2007-6420
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2007-6420.json
5
reference_url https://security.gentoo.org/glsa/200807-06
reference_id GLSA-200807-06
reference_type
scores
url https://security.gentoo.org/glsa/200807-06
6
reference_url https://usn.ubuntu.com/731-1/
reference_id USN-731-1
reference_type
scores
url https://usn.ubuntu.com/731-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.9-1?distro=trixie
purl pkg:deb/debian/apache2@2.2.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.9-1%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2007-6420
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-svyk-az69-qbfw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.9-1%3Fdistro=trixie