Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/apache2@2.2.17-2?distro=trixie
Typedeb
Namespacedebian
Nameapache2
Version2.2.17-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.2.18-1
Latest_non_vulnerable_version2.4.66-8
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-n76a-bbkc-tyhh
vulnerability_id VCID-n76a-bbkc-tyhh
summary The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618857
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618857
1
reference_url http://lists.err.no/pipermail/mpm-itk/2011-March/000393.html
reference_id
reference_type
scores
url http://lists.err.no/pipermail/mpm-itk/2011-March/000393.html
2
reference_url http://lists.err.no/pipermail/mpm-itk/2011-March/000394.html
reference_id
reference_type
scores
url http://lists.err.no/pipermail/mpm-itk/2011-March/000394.html
3
reference_url http://openwall.com/lists/oss-security/2011/03/20/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/20/1
4
reference_url http://openwall.com/lists/oss-security/2011/03/21/13
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/03/21/13
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1176
reference_id
reference_type
scores
0
value 0.0096
scoring_system epss
scoring_elements 0.76476
published_at 2026-04-13T12:55:00Z
1
value 0.0096
scoring_system epss
scoring_elements 0.76417
published_at 2026-04-01T12:55:00Z
2
value 0.0096
scoring_system epss
scoring_elements 0.76421
published_at 2026-04-02T12:55:00Z
3
value 0.0096
scoring_system epss
scoring_elements 0.76449
published_at 2026-04-04T12:55:00Z
4
value 0.0096
scoring_system epss
scoring_elements 0.76431
published_at 2026-04-07T12:55:00Z
5
value 0.0096
scoring_system epss
scoring_elements 0.76463
published_at 2026-04-08T12:55:00Z
6
value 0.0096
scoring_system epss
scoring_elements 0.76477
published_at 2026-04-09T12:55:00Z
7
value 0.0096
scoring_system epss
scoring_elements 0.76502
published_at 2026-04-11T12:55:00Z
8
value 0.0096
scoring_system epss
scoring_elements 0.76481
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1176
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1176
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66248
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66248
8
reference_url http://www.debian.org/security/2011/dsa-2202
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2202
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:057
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:057
10
reference_url http://www.securityfocus.com/bid/46953
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46953
11
reference_url http://www.vupen.com/english/advisories/2011/0748
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0748
12
reference_url http://www.vupen.com/english/advisories/2011/0749
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0749
13
reference_url http://www.vupen.com/english/advisories/2011/0824
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0824
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618857
reference_id 618857
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618857
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-01:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mpm-itk_project:mpm-itk:2.2.11-02:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1176
reference_id CVE-2011-1176
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1176
22
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:deb/debian/apache2@2.2.17-2?distro=trixie
purl pkg:deb/debian/apache2@2.2.17-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.17-2%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
aliases CVE-2011-1176
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n76a-bbkc-tyhh
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.2.17-2%3Fdistro=trixie