Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-servers/apache@2.2.22-r1
Typeebuild
Namespacewww-servers
Nameapache
Version2.2.22-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.2.25
Latest_non_vulnerable_version2.4.62
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-53da-z9gn-n7f2
vulnerability_id VCID-53da-z9gn-n7f2
summary A flaw was found in mod_log_config. If the '%{cookiename}C' log format string is in use, a remote attacker could send a specific cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0021.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0021.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0021
reference_id
reference_type
scores
0
value 0.3296
scoring_system epss
scoring_elements 0.96908
published_at 2026-04-26T12:55:00Z
1
value 0.3296
scoring_system epss
scoring_elements 0.96858
published_at 2026-04-01T12:55:00Z
2
value 0.3296
scoring_system epss
scoring_elements 0.96866
published_at 2026-04-02T12:55:00Z
3
value 0.3296
scoring_system epss
scoring_elements 0.96871
published_at 2026-04-04T12:55:00Z
4
value 0.3296
scoring_system epss
scoring_elements 0.96875
published_at 2026-04-07T12:55:00Z
5
value 0.3296
scoring_system epss
scoring_elements 0.96884
published_at 2026-04-08T12:55:00Z
6
value 0.3296
scoring_system epss
scoring_elements 0.96885
published_at 2026-04-09T12:55:00Z
7
value 0.3296
scoring_system epss
scoring_elements 0.96888
published_at 2026-04-11T12:55:00Z
8
value 0.3296
scoring_system epss
scoring_elements 0.96889
published_at 2026-04-12T12:55:00Z
9
value 0.3296
scoring_system epss
scoring_elements 0.9689
published_at 2026-04-13T12:55:00Z
10
value 0.3296
scoring_system epss
scoring_elements 0.96897
published_at 2026-04-16T12:55:00Z
11
value 0.3296
scoring_system epss
scoring_elements 0.96902
published_at 2026-04-18T12:55:00Z
12
value 0.3296
scoring_system epss
scoring_elements 0.96905
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0021
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785065
reference_id 785065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785065
4
reference_url https://httpd.apache.org/security/json/CVE-2012-0021.json
reference_id CVE-2012-0021
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0021.json
5
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
6
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
7
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
8
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2012-0021
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53da-z9gn-n7f2
1
url VCID-56kt-8bg6-zbcj
vulnerability_id VCID-56kt-8bg6-zbcj
summary A flaw was found in the handling of requests by mod_cache (2.2) and mod_dav (2.0 and 2.2). A malicious remote attacker could send a carefully crafted request and cause a httpd child process to crash. This crash would only be a denial of service if using the worker MPM. This issue is further mitigated as mod_dav is only affected by requests that are most likely to be authenticated, and mod_cache is only affected if the uncommon "CacheIgnoreURLSessionIdentifiers" directive, introduced in version 2.2.14, is used.
references
0
reference_url http://blogs.sun.com/security/entry/cve_2010_1452_mod_dav
reference_id
reference_type
scores
url http://blogs.sun.com/security/entry/cve_2010_1452_mod_dav
1
reference_url http://httpd.apache.org/security/vulnerabilities_22.html
reference_id
reference_type
scores
url http://httpd.apache.org/security/vulnerabilities_22.html
2
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html
5
reference_url http://marc.info/?l=apache-announce&m=128009718610929&w=2
reference_id
reference_type
scores
url http://marc.info/?l=apache-announce&m=128009718610929&w=2
6
reference_url http://marc.info/?l=bugtraq&m=129190899612998&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=129190899612998&w=2
7
reference_url http://marc.info/?l=bugtraq&m=133355494609819&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=133355494609819&w=2
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1452.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1452.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1452
reference_id
reference_type
scores
0
value 0.13871
scoring_system epss
scoring_elements 0.94319
published_at 2026-04-21T12:55:00Z
1
value 0.13871
scoring_system epss
scoring_elements 0.94323
published_at 2026-04-26T12:55:00Z
2
value 0.13871
scoring_system epss
scoring_elements 0.94299
published_at 2026-04-12T12:55:00Z
3
value 0.13871
scoring_system epss
scoring_elements 0.943
published_at 2026-04-13T12:55:00Z
4
value 0.13871
scoring_system epss
scoring_elements 0.94315
published_at 2026-04-16T12:55:00Z
5
value 0.13871
scoring_system epss
scoring_elements 0.9432
published_at 2026-04-18T12:55:00Z
6
value 0.15663
scoring_system epss
scoring_elements 0.94698
published_at 2026-04-11T12:55:00Z
7
value 0.15663
scoring_system epss
scoring_elements 0.94694
published_at 2026-04-09T12:55:00Z
8
value 0.15663
scoring_system epss
scoring_elements 0.94666
published_at 2026-04-01T12:55:00Z
9
value 0.15663
scoring_system epss
scoring_elements 0.94674
published_at 2026-04-02T12:55:00Z
10
value 0.15663
scoring_system epss
scoring_elements 0.94678
published_at 2026-04-04T12:55:00Z
11
value 0.15663
scoring_system epss
scoring_elements 0.9468
published_at 2026-04-07T12:55:00Z
12
value 0.15663
scoring_system epss
scoring_elements 0.9469
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1452
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452
11
reference_url http://secunia.com/advisories/42367
reference_id
reference_type
scores
url http://secunia.com/advisories/42367
12
reference_url https://issues.apache.org/bugzilla/show_bug.cgi?id=49246
reference_id
reference_type
scores
url https://issues.apache.org/bugzilla/show_bug.cgi?id=49246
13
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.467395
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.467395
14
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
34
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
35
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11683
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11683
36
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12341
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12341
37
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
38
reference_url http://ubuntu.com/usn/usn-1021-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-1021-1
39
reference_url http://www.redhat.com/support/errata/RHSA-2010-0659.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0659.html
40
reference_url http://www.redhat.com/support/errata/RHSA-2011-0896.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0896.html
41
reference_url http://www.redhat.com/support/errata/RHSA-2011-0897.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0897.html
42
reference_url http://www.vupen.com/english/advisories/2010/2218
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2218
43
reference_url http://www.vupen.com/english/advisories/2010/3064
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3064
44
reference_url http://www.vupen.com/english/advisories/2011/0291
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0291
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=618189
reference_id 618189
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=618189
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
47
reference_url https://httpd.apache.org/security/json/CVE-2010-1452.json
reference_id CVE-2010-1452
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2010-1452.json
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1452
reference_id CVE-2010-1452
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-1452
49
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
50
reference_url https://access.redhat.com/errata/RHSA-2010:0659
reference_id RHSA-2010:0659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0659
51
reference_url https://usn.ubuntu.com/1021-1/
reference_id USN-1021-1
reference_type
scores
url https://usn.ubuntu.com/1021-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2010-1452
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56kt-8bg6-zbcj
2
url VCID-5yez-d5nj-q7eq
vulnerability_id VCID-5yez-d5nj-q7eq
summary An integer overflow flaw was found which, when the mod_setenvif module is enabled, could allow local users to gain privileges via a .htaccess file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3607.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3607.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3607
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47453
published_at 2026-04-26T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47395
published_at 2026-04-01T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47429
published_at 2026-04-02T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.4745
published_at 2026-04-09T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47399
published_at 2026-04-07T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47454
published_at 2026-04-08T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47473
published_at 2026-04-11T12:55:00Z
7
value 0.00242
scoring_system epss
scoring_elements 0.47448
published_at 2026-04-12T12:55:00Z
8
value 0.00242
scoring_system epss
scoring_elements 0.47455
published_at 2026-04-13T12:55:00Z
9
value 0.00242
scoring_system epss
scoring_elements 0.47514
published_at 2026-04-16T12:55:00Z
10
value 0.00242
scoring_system epss
scoring_elements 0.47507
published_at 2026-04-18T12:55:00Z
11
value 0.00242
scoring_system epss
scoring_elements 0.47458
published_at 2026-04-21T12:55:00Z
12
value 0.00242
scoring_system epss
scoring_elements 0.47445
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3607
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=769844
reference_id 769844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=769844
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3607.json
reference_id CVE-2011-3607
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3607.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41769.txt
reference_id CVE-2011-4415;CVE-2011-3607
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41769.txt
6
reference_url http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
reference_id CVE-2011-4415;CVE-2011-3607
reference_type exploit
scores
url http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
10
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
11
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
12
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2011-3607
risk_score 4.2
exploitability 2.0
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yez-d5nj-q7eq
3
url VCID-6vze-zk58-7yep
vulnerability_id VCID-6vze-zk58-7yep
summary A flaw was found when mod_proxy_ajp is used together with mod_proxy_balancer. Given a specific configuration, a remote attacker could send certain malformed HTTP requests, putting a backend server into an error state until the retry timeout expired. This could lead to a temporary denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3348.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3348.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3348
reference_id
reference_type
scores
0
value 0.34026
scoring_system epss
scoring_elements 0.96985
published_at 2026-04-26T12:55:00Z
1
value 0.34026
scoring_system epss
scoring_elements 0.9694
published_at 2026-04-01T12:55:00Z
2
value 0.34026
scoring_system epss
scoring_elements 0.96947
published_at 2026-04-02T12:55:00Z
3
value 0.34026
scoring_system epss
scoring_elements 0.96952
published_at 2026-04-04T12:55:00Z
4
value 0.34026
scoring_system epss
scoring_elements 0.96955
published_at 2026-04-07T12:55:00Z
5
value 0.34026
scoring_system epss
scoring_elements 0.96963
published_at 2026-04-08T12:55:00Z
6
value 0.34026
scoring_system epss
scoring_elements 0.96964
published_at 2026-04-09T12:55:00Z
7
value 0.34026
scoring_system epss
scoring_elements 0.96967
published_at 2026-04-11T12:55:00Z
8
value 0.34026
scoring_system epss
scoring_elements 0.96968
published_at 2026-04-12T12:55:00Z
9
value 0.34026
scoring_system epss
scoring_elements 0.96969
published_at 2026-04-13T12:55:00Z
10
value 0.34026
scoring_system epss
scoring_elements 0.96977
published_at 2026-04-16T12:55:00Z
11
value 0.34026
scoring_system epss
scoring_elements 0.96981
published_at 2026-04-18T12:55:00Z
12
value 0.34026
scoring_system epss
scoring_elements 0.96982
published_at 2026-04-21T12:55:00Z
13
value 0.34026
scoring_system epss
scoring_elements 0.96983
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3348
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=736690
reference_id 736690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=736690
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3348.json
reference_id CVE-2011-3348
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3348.json
5
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
6
reference_url https://access.redhat.com/errata/RHSA-2011:1391
reference_id RHSA-2011:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1391
7
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
8
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
9
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2011-3348
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vze-zk58-7yep
4
url VCID-cn4b-1w42-gyda
vulnerability_id VCID-cn4b-1w42-gyda
summary
An information disclosure flaw was found in mod_proxy_http in version 2.2.9 only, on Unix platforms. Under certain timeout conditions, the server could return a response intended for another user. Only those configurations which trigger the use of proxy worker pools are affected. There was no vulnerability on earlier versions, as proxy pools were not yet introduced. The simplest workaround is to globally configure:
SetEnv proxy-nokeepalive 1
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2791.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2791
reference_id
reference_type
scores
0
value 0.02076
scoring_system epss
scoring_elements 0.84025
published_at 2026-04-26T12:55:00Z
1
value 0.02076
scoring_system epss
scoring_elements 0.83897
published_at 2026-04-01T12:55:00Z
2
value 0.02076
scoring_system epss
scoring_elements 0.83991
published_at 2026-04-21T12:55:00Z
3
value 0.02076
scoring_system epss
scoring_elements 0.84018
published_at 2026-04-24T12:55:00Z
4
value 0.02076
scoring_system epss
scoring_elements 0.83912
published_at 2026-04-02T12:55:00Z
5
value 0.02076
scoring_system epss
scoring_elements 0.83928
published_at 2026-04-04T12:55:00Z
6
value 0.02076
scoring_system epss
scoring_elements 0.83931
published_at 2026-04-07T12:55:00Z
7
value 0.02076
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-08T12:55:00Z
8
value 0.02076
scoring_system epss
scoring_elements 0.83961
published_at 2026-04-09T12:55:00Z
9
value 0.02076
scoring_system epss
scoring_elements 0.83977
published_at 2026-04-11T12:55:00Z
10
value 0.02076
scoring_system epss
scoring_elements 0.83971
published_at 2026-04-12T12:55:00Z
11
value 0.02076
scoring_system epss
scoring_elements 0.83967
published_at 2026-04-13T12:55:00Z
12
value 0.02076
scoring_system epss
scoring_elements 0.8399
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2791
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2791
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/60883
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/60883
4
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
5
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
20
reference_url http://www.openwall.com/lists/oss-security/2010/07/30/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/07/30/1
21
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
22
reference_url http://www.redhat.com/support/errata/RHSA-2010-0659.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0659.html
23
reference_url http://www.securityfocus.com/bid/42102
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42102
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=617523
reference_id 617523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=617523
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*
27
reference_url https://httpd.apache.org/security/json/CVE-2010-2791.json
reference_id CVE-2010-2791
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2010-2791.json
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2791
reference_id CVE-2010-2791
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2010-2791
29
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
30
reference_url https://access.redhat.com/errata/RHSA-2010:0659
reference_id RHSA-2010:0659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0659
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2010-2791
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cn4b-1w42-gyda
5
url VCID-d4rc-pnv5-6uc8
vulnerability_id VCID-d4rc-pnv5-6uc8
summary A flaw was found in the default error response for status code 400. This flaw could be used by an attacker to expose "httpOnly" cookies when no custom ErrorDocument is specified.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0053.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0053
reference_id
reference_type
scores
0
value 0.55955
scoring_system epss
scoring_elements 0.98104
published_at 2026-04-24T12:55:00Z
1
value 0.55955
scoring_system epss
scoring_elements 0.98081
published_at 2026-04-01T12:55:00Z
2
value 0.55955
scoring_system epss
scoring_elements 0.98084
published_at 2026-04-02T12:55:00Z
3
value 0.55955
scoring_system epss
scoring_elements 0.98088
published_at 2026-04-07T12:55:00Z
4
value 0.55955
scoring_system epss
scoring_elements 0.98093
published_at 2026-04-09T12:55:00Z
5
value 0.55955
scoring_system epss
scoring_elements 0.98099
published_at 2026-04-12T12:55:00Z
6
value 0.55955
scoring_system epss
scoring_elements 0.981
published_at 2026-04-13T12:55:00Z
7
value 0.55955
scoring_system epss
scoring_elements 0.98105
published_at 2026-04-26T12:55:00Z
8
value 0.55955
scoring_system epss
scoring_elements 0.98107
published_at 2026-04-18T12:55:00Z
9
value 0.55955
scoring_system epss
scoring_elements 0.98103
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785069
reference_id 785069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785069
4
reference_url https://httpd.apache.org/security/json/CVE-2012-0053.json
reference_id CVE-2012-0053
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0053.json
5
reference_url https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08
reference_id CVE-2012-0053;OSVDB-78556
reference_type exploit
scores
url https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/18442.html
reference_id CVE-2012-0053;OSVDB-78556
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/18442.html
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
10
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
11
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
12
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2012-0053
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4rc-pnv5-6uc8
6
url VCID-ese4-47tg-efbw
vulnerability_id VCID-ese4-47tg-efbw
summary Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0883.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0883
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41496
published_at 2026-04-26T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41584
published_at 2026-04-01T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41671
published_at 2026-04-02T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41698
published_at 2026-04-04T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41626
published_at 2026-04-07T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41676
published_at 2026-04-08T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41684
published_at 2026-04-09T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41707
published_at 2026-04-16T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41674
published_at 2026-04-12T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.4166
published_at 2026-04-13T12:55:00Z
10
value 0.00197
scoring_system epss
scoring_elements 0.41681
published_at 2026-04-18T12:55:00Z
11
value 0.00197
scoring_system epss
scoring_elements 0.41607
published_at 2026-04-21T12:55:00Z
12
value 0.00197
scoring_system epss
scoring_elements 0.41499
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0883
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=813559
reference_id 813559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=813559
3
reference_url https://httpd.apache.org/security/json/CVE-2012-0883.json
reference_id CVE-2012-0883
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0883.json
4
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
5
reference_url https://access.redhat.com/errata/RHSA-2012:1594
reference_id RHSA-2012:1594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1594
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2012-0883
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ese4-47tg-efbw
7
url VCID-gu44-7hkr-muae
vulnerability_id VCID-gu44-7hkr-muae
summary An additional exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4317.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4317
reference_id
reference_type
scores
0
value 0.81918
scoring_system epss
scoring_elements 0.99208
published_at 2026-04-26T12:55:00Z
1
value 0.81918
scoring_system epss
scoring_elements 0.99193
published_at 2026-04-01T12:55:00Z
2
value 0.81918
scoring_system epss
scoring_elements 0.99195
published_at 2026-04-02T12:55:00Z
3
value 0.81918
scoring_system epss
scoring_elements 0.99197
published_at 2026-04-04T12:55:00Z
4
value 0.81918
scoring_system epss
scoring_elements 0.99201
published_at 2026-04-13T12:55:00Z
5
value 0.81918
scoring_system epss
scoring_elements 0.99202
published_at 2026-04-09T12:55:00Z
6
value 0.81918
scoring_system epss
scoring_elements 0.99203
published_at 2026-04-16T12:55:00Z
7
value 0.81918
scoring_system epss
scoring_elements 0.99205
published_at 2026-04-21T12:55:00Z
8
value 0.81918
scoring_system epss
scoring_elements 0.99207
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=756483
reference_id 756483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=756483
4
reference_url https://httpd.apache.org/security/json/CVE-2011-4317.json
reference_id CVE-2011-4317
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-4317.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36352.txt
reference_id CVE-2011-4317;OSVDB-77310
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36352.txt
6
reference_url https://www.securityfocus.com/bid/50802/info
reference_id CVE-2011-4317;OSVDB-77310
reference_type exploit
scores
url https://www.securityfocus.com/bid/50802/info
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2011-4317
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gu44-7hkr-muae
8
url VCID-kkfv-4jd1-bqdm
vulnerability_id VCID-kkfv-4jd1-bqdm
summary A flaw was found in the way the Apache HTTP Server handled Range HTTP headers. A remote attacker could use this flaw to cause httpd to use an excessive amount of memory and CPU time via HTTP requests with a specially-crafted Range header. This could be used in a denial of service attack. Advisory: CVE-2011-3192.txt
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3192.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3192
reference_id
reference_type
scores
0
value 0.90456
scoring_system epss
scoring_elements 0.99609
published_at 2026-04-16T12:55:00Z
1
value 0.90456
scoring_system epss
scoring_elements 0.99604
published_at 2026-04-02T12:55:00Z
2
value 0.90456
scoring_system epss
scoring_elements 0.99605
published_at 2026-04-04T12:55:00Z
3
value 0.90456
scoring_system epss
scoring_elements 0.99606
published_at 2026-04-07T12:55:00Z
4
value 0.90456
scoring_system epss
scoring_elements 0.99607
published_at 2026-04-13T12:55:00Z
5
value 0.90456
scoring_system epss
scoring_elements 0.99608
published_at 2026-04-12T12:55:00Z
6
value 0.90534
scoring_system epss
scoring_elements 0.99616
published_at 2026-04-26T12:55:00Z
7
value 0.90534
scoring_system epss
scoring_elements 0.99613
published_at 2026-04-18T12:55:00Z
8
value 0.90534
scoring_system epss
scoring_elements 0.99614
published_at 2026-04-21T12:55:00Z
9
value 0.90534
scoring_system epss
scoring_elements 0.99615
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=732928
reference_id 732928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=732928
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3192.json
reference_id CVE-2011-3192
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3192.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18221.c
reference_id CVE-2014-5329;OSVDB-74721;CVE-2011-3192
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18221.c
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17696.pl
reference_id CVE-2014-5329;OSVDB-74721;CVE-2011-3192
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17696.pl
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2011:1245
reference_id RHSA-2011:1245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1245
9
reference_url https://access.redhat.com/errata/RHSA-2011:1294
reference_id RHSA-2011:1294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1294
10
reference_url https://access.redhat.com/errata/RHSA-2011:1300
reference_id RHSA-2011:1300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1300
11
reference_url https://access.redhat.com/errata/RHSA-2011:1329
reference_id RHSA-2011:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1329
12
reference_url https://access.redhat.com/errata/RHSA-2011:1330
reference_id RHSA-2011:1330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1330
13
reference_url https://usn.ubuntu.com/1199-1/
reference_id USN-1199-1
reference_type
scores
url https://usn.ubuntu.com/1199-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2011-3192
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kkfv-4jd1-bqdm
9
url VCID-pdtf-5zv7-2qaf
vulnerability_id VCID-pdtf-5zv7-2qaf
summary mod_proxy_ajp would return the wrong status code if it encountered an error, causing a backend server to be put into an error state until the retry timeout expired. A remote attacker could send malicious requests to trigger this issue, resulting in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0408.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0408
reference_id
reference_type
scores
0
value 0.30734
scoring_system epss
scoring_elements 0.96737
published_at 2026-04-26T12:55:00Z
1
value 0.30734
scoring_system epss
scoring_elements 0.96691
published_at 2026-04-01T12:55:00Z
2
value 0.30734
scoring_system epss
scoring_elements 0.96701
published_at 2026-04-02T12:55:00Z
3
value 0.30734
scoring_system epss
scoring_elements 0.96703
published_at 2026-04-04T12:55:00Z
4
value 0.30734
scoring_system epss
scoring_elements 0.96707
published_at 2026-04-07T12:55:00Z
5
value 0.30734
scoring_system epss
scoring_elements 0.96715
published_at 2026-04-08T12:55:00Z
6
value 0.30734
scoring_system epss
scoring_elements 0.96717
published_at 2026-04-09T12:55:00Z
7
value 0.30734
scoring_system epss
scoring_elements 0.96719
published_at 2026-04-11T12:55:00Z
8
value 0.30734
scoring_system epss
scoring_elements 0.9672
published_at 2026-04-12T12:55:00Z
9
value 0.30734
scoring_system epss
scoring_elements 0.96722
published_at 2026-04-13T12:55:00Z
10
value 0.30734
scoring_system epss
scoring_elements 0.96728
published_at 2026-04-16T12:55:00Z
11
value 0.30734
scoring_system epss
scoring_elements 0.96733
published_at 2026-04-18T12:55:00Z
12
value 0.30734
scoring_system epss
scoring_elements 0.96736
published_at 2026-04-21T12:55:00Z
13
value 0.30734
scoring_system epss
scoring_elements 0.96735
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0408
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=569905
reference_id 569905
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=569905
4
reference_url https://httpd.apache.org/security/json/CVE-2010-0408.json
reference_id CVE-2010-0408
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2010-0408.json
5
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
6
reference_url https://access.redhat.com/errata/RHSA-2010:0168
reference_id RHSA-2010:0168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0168
7
reference_url https://access.redhat.com/errata/RHSA-2010:0396
reference_id RHSA-2010:0396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0396
8
reference_url https://usn.ubuntu.com/908-1/
reference_id USN-908-1
reference_type
scores
url https://usn.ubuntu.com/908-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2010-0408
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdtf-5zv7-2qaf
10
url VCID-prd8-51a5-pygj
vulnerability_id VCID-prd8-51a5-pygj
summary
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released.
Patches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
reference_id
reference_type
scores
0
value 0.76893
scoring_system epss
scoring_elements 0.98966
published_at 2026-04-26T12:55:00Z
1
value 0.79136
scoring_system epss
scoring_elements 0.99054
published_at 2026-04-01T12:55:00Z
2
value 0.79136
scoring_system epss
scoring_elements 0.99055
published_at 2026-04-02T12:55:00Z
3
value 0.79136
scoring_system epss
scoring_elements 0.99059
published_at 2026-04-04T12:55:00Z
4
value 0.79136
scoring_system epss
scoring_elements 0.99062
published_at 2026-04-07T12:55:00Z
5
value 0.79136
scoring_system epss
scoring_elements 0.99063
published_at 2026-04-08T12:55:00Z
6
value 0.79136
scoring_system epss
scoring_elements 0.99065
published_at 2026-04-13T12:55:00Z
7
value 0.79136
scoring_system epss
scoring_elements 0.99066
published_at 2026-04-16T12:55:00Z
8
value 0.79136
scoring_system epss
scoring_elements 0.99067
published_at 2026-04-18T12:55:00Z
9
value 0.79136
scoring_system epss
scoring_elements 0.99069
published_at 2026-04-21T12:55:00Z
10
value 0.79136
scoring_system epss
scoring_elements 0.99071
published_at 2026-04-24T12:55:00Z
11
value 0.79136
scoring_system epss
scoring_elements 0.99064
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=740045
reference_id 740045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=740045
4
reference_url https://httpd.apache.org/security/json/CVE-2011-3368.json
reference_id CVE-2011-3368
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2011-3368.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
reference_id CVE-2011-3368;OSVDB-76079
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py
6
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
7
reference_url https://access.redhat.com/errata/RHSA-2011:1391
reference_id RHSA-2011:1391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1391
8
reference_url https://access.redhat.com/errata/RHSA-2011:1392
reference_id RHSA-2011:1392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1392
9
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
10
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
11
reference_url https://usn.ubuntu.com/1259-1/
reference_id USN-1259-1
reference_type
scores
url https://usn.ubuntu.com/1259-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2011-3368
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prd8-51a5-pygj
11
url VCID-wycq-jwzz-q7hf
vulnerability_id VCID-wycq-jwzz-q7hf
summary A flaw in the core subrequest process code was fixed, to always provide a shallow copy of the headers_in array to the subrequest, instead of a pointer to the parent request's array as it had for requests without request bodies. This meant all modules such as mod_headers which may manipulate the input headers for a subrequest would poison the parent request in two ways, one by modifying the parent request, which might not be intended, and second by leaving pointers to modified header fields in memory allocated to the subrequest scope, which could be freed before the main request processing was finished, resulting in a segfault or in revealing data from another request on threaded servers, such as the worker or winnt MPMs.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0434.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0434
reference_id
reference_type
scores
0
value 0.02554
scoring_system epss
scoring_elements 0.85557
published_at 2026-04-26T12:55:00Z
1
value 0.02554
scoring_system epss
scoring_elements 0.85428
published_at 2026-04-01T12:55:00Z
2
value 0.02554
scoring_system epss
scoring_elements 0.8544
published_at 2026-04-02T12:55:00Z
3
value 0.02554
scoring_system epss
scoring_elements 0.8546
published_at 2026-04-04T12:55:00Z
4
value 0.02554
scoring_system epss
scoring_elements 0.85463
published_at 2026-04-07T12:55:00Z
5
value 0.02554
scoring_system epss
scoring_elements 0.85484
published_at 2026-04-08T12:55:00Z
6
value 0.02554
scoring_system epss
scoring_elements 0.85492
published_at 2026-04-09T12:55:00Z
7
value 0.02554
scoring_system epss
scoring_elements 0.85506
published_at 2026-04-11T12:55:00Z
8
value 0.02554
scoring_system epss
scoring_elements 0.85504
published_at 2026-04-12T12:55:00Z
9
value 0.02554
scoring_system epss
scoring_elements 0.85501
published_at 2026-04-13T12:55:00Z
10
value 0.02554
scoring_system epss
scoring_elements 0.85525
published_at 2026-04-16T12:55:00Z
11
value 0.02554
scoring_system epss
scoring_elements 0.85529
published_at 2026-04-18T12:55:00Z
12
value 0.02554
scoring_system epss
scoring_elements 0.85526
published_at 2026-04-21T12:55:00Z
13
value 0.02554
scoring_system epss
scoring_elements 0.85548
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=570171
reference_id 570171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=570171
4
reference_url https://httpd.apache.org/security/json/CVE-2010-0434.json
reference_id CVE-2010-0434
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2010-0434.json
5
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
6
reference_url https://access.redhat.com/errata/RHSA-2010:0168
reference_id RHSA-2010:0168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0168
7
reference_url https://access.redhat.com/errata/RHSA-2010:0175
reference_id RHSA-2010:0175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0175
8
reference_url https://access.redhat.com/errata/RHSA-2010:0396
reference_id RHSA-2010:0396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0396
9
reference_url https://usn.ubuntu.com/908-1/
reference_id USN-908-1
reference_type
scores
url https://usn.ubuntu.com/908-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2010-0434
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wycq-jwzz-q7hf
12
url VCID-ym93-sxb8-fkdm
vulnerability_id VCID-ym93-sxb8-fkdm
summary A flaw was found in the handling of the scoreboard. An unprivileged child process could cause the parent process to crash at shutdown rather than terminate cleanly.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0031.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0031.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0031
reference_id
reference_type
scores
0
value 0.01196
scoring_system epss
scoring_elements 0.78943
published_at 2026-04-26T12:55:00Z
1
value 0.01196
scoring_system epss
scoring_elements 0.78837
published_at 2026-04-01T12:55:00Z
2
value 0.01196
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-02T12:55:00Z
3
value 0.01196
scoring_system epss
scoring_elements 0.78872
published_at 2026-04-04T12:55:00Z
4
value 0.01196
scoring_system epss
scoring_elements 0.78854
published_at 2026-04-07T12:55:00Z
5
value 0.01196
scoring_system epss
scoring_elements 0.78879
published_at 2026-04-08T12:55:00Z
6
value 0.01196
scoring_system epss
scoring_elements 0.78886
published_at 2026-04-09T12:55:00Z
7
value 0.01196
scoring_system epss
scoring_elements 0.78909
published_at 2026-04-11T12:55:00Z
8
value 0.01196
scoring_system epss
scoring_elements 0.78893
published_at 2026-04-12T12:55:00Z
9
value 0.01196
scoring_system epss
scoring_elements 0.78884
published_at 2026-04-13T12:55:00Z
10
value 0.01196
scoring_system epss
scoring_elements 0.78912
published_at 2026-04-16T12:55:00Z
11
value 0.01196
scoring_system epss
scoring_elements 0.7891
published_at 2026-04-18T12:55:00Z
12
value 0.01196
scoring_system epss
scoring_elements 0.78907
published_at 2026-04-21T12:55:00Z
13
value 0.01196
scoring_system epss
scoring_elements 0.78936
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0031
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=773744
reference_id 773744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=773744
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41768.txt
reference_id CVE-2012-0031
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41768.txt
5
reference_url https://httpd.apache.org/security/json/CVE-2012-0031.json
reference_id CVE-2012-0031
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2012-0031.json
6
reference_url http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/
reference_id CVE-2012-0031
reference_type exploit
scores
url http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/
7
reference_url https://security.gentoo.org/glsa/201206-25
reference_id GLSA-201206-25
reference_type
scores
url https://security.gentoo.org/glsa/201206-25
8
reference_url https://access.redhat.com/errata/RHSA-2012:0128
reference_id RHSA-2012:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0128
9
reference_url https://access.redhat.com/errata/RHSA-2012:0323
reference_id RHSA-2012:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0323
10
reference_url https://access.redhat.com/errata/RHSA-2012:0542
reference_id RHSA-2012:0542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0542
11
reference_url https://access.redhat.com/errata/RHSA-2012:0543
reference_id RHSA-2012:0543
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0543
12
reference_url https://usn.ubuntu.com/1368-1/
reference_id USN-1368-1
reference_type
scores
url https://usn.ubuntu.com/1368-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.22-r1
purl pkg:ebuild/www-servers/apache@2.2.22-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1
aliases CVE-2012-0031
risk_score 4.2
exploitability 2.0
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ym93-sxb8-fkdm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.22-r1