Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-servers/apache@2.2.25
Typeebuild
Namespacewww-servers
Nameapache
Version2.2.25
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.2.27-r4
Latest_non_vulnerable_version2.4.62
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1bv2-mkj8-ubaz
vulnerability_id VCID-1bv2-mkj8-ubaz
summary mod_rewrite does not filter terminal escape sequences from logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
3
reference_url http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch
reference_id
reference_type
scores
url http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-0815.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0815.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1207.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1207.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1208.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1208.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2013-1209.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1209.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1862.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1862.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1862
reference_id
reference_type
scores
0
value 0.39611
scoring_system epss
scoring_elements 0.97316
published_at 2026-04-16T12:55:00Z
1
value 0.39611
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-01T12:55:00Z
2
value 0.39611
scoring_system epss
scoring_elements 0.97308
published_at 2026-04-12T12:55:00Z
3
value 0.39611
scoring_system epss
scoring_elements 0.97309
published_at 2026-04-13T12:55:00Z
4
value 0.39611
scoring_system epss
scoring_elements 0.97292
published_at 2026-04-02T12:55:00Z
5
value 0.39611
scoring_system epss
scoring_elements 0.97297
published_at 2026-04-04T12:55:00Z
6
value 0.39611
scoring_system epss
scoring_elements 0.97298
published_at 2026-04-07T12:55:00Z
7
value 0.39611
scoring_system epss
scoring_elements 0.97304
published_at 2026-04-09T12:55:00Z
8
value 0.39611
scoring_system epss
scoring_elements 0.97307
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1862
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862
11
reference_url http://secunia.com/advisories/55032
reference_id
reference_type
scores
url http://secunia.com/advisories/55032
12
reference_url https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
reference_id
reference_type
scores
url https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
13
reference_url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18790
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18790
34
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19534
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19534
35
reference_url http://support.apple.com/kb/HT6150
reference_id
reference_type
scores
url http://support.apple.com/kb/HT6150
36
reference_url http://svn.apache.org/viewvc?view=revision&revision=r1469311
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=revision&revision=r1469311
37
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1862
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1862
38
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
39
reference_url http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
reference_id
reference_type
scores
url http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:174
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:174
41
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
42
reference_url http://www.securityfocus.com/bid/59826
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59826
43
reference_url http://www.securityfocus.com/bid/64758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/64758
44
reference_url http://www.ubuntu.com/usn/USN-1903-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1903-1
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=953729
reference_id 953729
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=953729
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
72
reference_url https://httpd.apache.org/security/json/CVE-2013-1862.json
reference_id CVE-2013-1862
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2013-1862.json
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1862
reference_id CVE-2013-1862
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1862
74
reference_url https://security.gentoo.org/glsa/201309-12
reference_id GLSA-201309-12
reference_type
scores
url https://security.gentoo.org/glsa/201309-12
75
reference_url https://access.redhat.com/errata/RHSA-2013:0815
reference_id RHSA-2013:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0815
76
reference_url https://access.redhat.com/errata/RHSA-2013:1133
reference_id RHSA-2013:1133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1133
77
reference_url https://access.redhat.com/errata/RHSA-2013:1134
reference_id RHSA-2013:1134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1134
78
reference_url https://access.redhat.com/errata/RHSA-2013:1207
reference_id RHSA-2013:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1207
79
reference_url https://access.redhat.com/errata/RHSA-2013:1208
reference_id RHSA-2013:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1208
80
reference_url https://access.redhat.com/errata/RHSA-2013:1209
reference_id RHSA-2013:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1209
81
reference_url https://usn.ubuntu.com/1903-1/
reference_id USN-1903-1
reference_type
scores
url https://usn.ubuntu.com/1903-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.25
purl pkg:ebuild/www-servers/apache@2.2.25
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.25
aliases CVE-2013-1862
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bv2-mkj8-ubaz
1
url VCID-4mqa-bkha-kbaj
vulnerability_id VCID-4mqa-bkha-kbaj
summary security update
references
0
reference_url http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
reference_id
reference_type
scores
url http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/
1
reference_url http://code.google.com/p/chromium/issues/detail?id=139744
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=139744
2
reference_url http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
reference_id
reference_type
scores
url http://isecpartners.com/blog/2012/9/14/details-on-the-crime-attack.html
3
reference_url http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.html
reference_id
reference_type
scores
url http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.html
4
reference_url http://jvn.jp/en/jp/JVN65273415/index.html
reference_id
reference_type
scores
url http://jvn.jp/en/jp/JVN65273415/index.html
5
reference_url http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html
10
reference_url http://marc.info/?l=bugtraq&m=136612293908376&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136612293908376&w=2
11
reference_url http://news.ycombinator.com/item?id=4510829
reference_id
reference_type
scores
url http://news.ycombinator.com/item?id=4510829
12
reference_url http://rhn.redhat.com/errata/RHSA-2013-0587.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0587.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4929.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4929.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4929
reference_id
reference_type
scores
0
value 0.13867
scoring_system epss
scoring_elements 0.94313
published_at 2026-04-16T12:55:00Z
1
value 0.13867
scoring_system epss
scoring_elements 0.94297
published_at 2026-04-12T12:55:00Z
2
value 0.13867
scoring_system epss
scoring_elements 0.94298
published_at 2026-04-13T12:55:00Z
3
value 0.15291
scoring_system epss
scoring_elements 0.94601
published_at 2026-04-07T12:55:00Z
4
value 0.15291
scoring_system epss
scoring_elements 0.94585
published_at 2026-04-01T12:55:00Z
5
value 0.15291
scoring_system epss
scoring_elements 0.94615
published_at 2026-04-09T12:55:00Z
6
value 0.15291
scoring_system epss
scoring_elements 0.94611
published_at 2026-04-08T12:55:00Z
7
value 0.15291
scoring_system epss
scoring_elements 0.94592
published_at 2026-04-02T12:55:00Z
8
value 0.15291
scoring_system epss
scoring_elements 0.94599
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4929
15
reference_url https://chromiumcodereview.appspot.com/10825183
reference_id
reference_type
scores
url https://chromiumcodereview.appspot.com/10825183
16
reference_url https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
reference_id
reference_type
scores
url https://community.qualys.com/blogs/securitylabs/2012/09/14/crime-information-leakage-attack-against-ssltls
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
20
reference_url http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor
reference_id
reference_type
scores
url http://security.stackexchange.com/questions/19911/crime-how-to-beat-the-beast-successor
21
reference_url https://gist.github.com/3696912
reference_id
reference_type
scores
url https://gist.github.com/3696912
22
reference_url https://github.com/mpgn/CRIME-poc
reference_id
reference_type
scores
url https://github.com/mpgn/CRIME-poc
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18920
24
reference_url https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212
reference_id
reference_type
scores
url https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212
25
reference_url http://support.apple.com/kb/HT5784
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5784
26
reference_url http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
reference_id
reference_type
scores
url http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
27
reference_url http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512
reference_id
reference_type
scores
url http://threatpost.com/en_us/blogs/new-attack-uses-ssltls-information-leak-hijack-https-sessions-090512
28
reference_url http://www.debian.org/security/2012/dsa-2579
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2579
29
reference_url http://www.debian.org/security/2013/dsa-2627
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2627
30
reference_url http://www.debian.org/security/2015/dsa-3253
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3253
31
reference_url http://www.ekoparty.org/2012/thai-duong.php
reference_id
reference_type
scores
url http://www.ekoparty.org/2012/thai-duong.php
32
reference_url http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091
reference_id
reference_type
scores
url http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091
33
reference_url http://www.securityfocus.com/bid/55704
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55704
34
reference_url http://www.theregister.co.uk/2012/09/14/crime_tls_attack/
reference_id
reference_type
scores
url http://www.theregister.co.uk/2012/09/14/crime_tls_attack/
35
reference_url http://www.ubuntu.com/usn/USN-1627-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1627-1
36
reference_url http://www.ubuntu.com/usn/USN-1628-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1628-1
37
reference_url http://www.ubuntu.com/usn/USN-1898-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1898-1
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689936
reference_id 689936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689936
39
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700399
reference_id 700399
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700399
40
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700426
reference_id 700426
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700426
41
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727197
reference_id 727197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727197
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728055
reference_id 728055
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728055
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=857051
reference_id 857051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=857051
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4929
reference_id CVE-2012-4929
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4929
49
reference_url https://security.gentoo.org/glsa/201309-12
reference_id GLSA-201309-12
reference_type
scores
url https://security.gentoo.org/glsa/201309-12
50
reference_url https://access.redhat.com/errata/RHSA-2013:0587
reference_id RHSA-2013:0587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0587
51
reference_url https://access.redhat.com/errata/RHSA-2013:0636
reference_id RHSA-2013:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0636
52
reference_url https://access.redhat.com/errata/RHSA-2014:0416
reference_id RHSA-2014:0416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0416
53
reference_url https://usn.ubuntu.com/1627-1/
reference_id USN-1627-1
reference_type
scores
url https://usn.ubuntu.com/1627-1/
54
reference_url https://usn.ubuntu.com/1628-1/
reference_id USN-1628-1
reference_type
scores
url https://usn.ubuntu.com/1628-1/
55
reference_url https://usn.ubuntu.com/1898-1/
reference_id USN-1898-1
reference_type
scores
url https://usn.ubuntu.com/1898-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.25
purl pkg:ebuild/www-servers/apache@2.2.25
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.25
aliases CVE-2012-4929
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mqa-bkha-kbaj
2
url VCID-8axm-4anr-27ht
vulnerability_id VCID-8axm-4anr-27ht
summary Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-1156.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1156.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1207.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1207.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1208.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1208.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-1209.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1209.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1896.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1896.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1896
reference_id
reference_type
scores
0
value 0.38555
scoring_system epss
scoring_elements 0.9725
published_at 2026-04-16T12:55:00Z
1
value 0.38555
scoring_system epss
scoring_elements 0.97214
published_at 2026-04-01T12:55:00Z
2
value 0.38555
scoring_system epss
scoring_elements 0.9724
published_at 2026-04-11T12:55:00Z
3
value 0.38555
scoring_system epss
scoring_elements 0.97242
published_at 2026-04-13T12:55:00Z
4
value 0.38555
scoring_system epss
scoring_elements 0.97219
published_at 2026-04-02T12:55:00Z
5
value 0.38555
scoring_system epss
scoring_elements 0.97225
published_at 2026-04-04T12:55:00Z
6
value 0.38555
scoring_system epss
scoring_elements 0.97226
published_at 2026-04-07T12:55:00Z
7
value 0.38555
scoring_system epss
scoring_elements 0.97236
published_at 2026-04-08T12:55:00Z
8
value 0.38555
scoring_system epss
scoring_elements 0.97237
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1896
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
10
reference_url http://secunia.com/advisories/55032
reference_id
reference_type
scores
url http://secunia.com/advisories/55032
11
reference_url https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
reference_id
reference_type
scores
url https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
12
reference_url https://httpd.apache.org/security/vulnerabilities_24.html
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html
13
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
25
reference_url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
26
reference_url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
27
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
28
reference_url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
29
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
30
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
31
reference_url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747
34
reference_url http://support.apple.com/kb/HT6150
reference_id
reference_type
scores
url http://support.apple.com/kb/HT6150
35
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h
36
reference_url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log
37
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896
38
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
39
reference_url http://www.apache.org/dist/httpd/Announcement2.2.html
reference_id
reference_type
scores
url http://www.apache.org/dist/httpd/Announcement2.2.html
40
reference_url http://www.securityfocus.com/bid/61129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/61129
41
reference_url http://www.ubuntu.com/usn/USN-1903-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1903-1
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717272
reference_id 717272
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717272
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=983549
reference_id 983549
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=983549
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://httpd.apache.org/security/json/CVE-2013-1896.json
reference_id CVE-2013-1896
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2013-1896.json
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1896
reference_id CVE-2013-1896
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1896
68
reference_url https://security.gentoo.org/glsa/201309-12
reference_id GLSA-201309-12
reference_type
scores
url https://security.gentoo.org/glsa/201309-12
69
reference_url https://access.redhat.com/errata/RHSA-2013:1133
reference_id RHSA-2013:1133
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1133
70
reference_url https://access.redhat.com/errata/RHSA-2013:1134
reference_id RHSA-2013:1134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1134
71
reference_url https://access.redhat.com/errata/RHSA-2013:1156
reference_id RHSA-2013:1156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1156
72
reference_url https://access.redhat.com/errata/RHSA-2013:1207
reference_id RHSA-2013:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1207
73
reference_url https://access.redhat.com/errata/RHSA-2013:1208
reference_id RHSA-2013:1208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1208
74
reference_url https://access.redhat.com/errata/RHSA-2013:1209
reference_id RHSA-2013:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1209
75
reference_url https://usn.ubuntu.com/1903-1/
reference_id USN-1903-1
reference_type
scores
url https://usn.ubuntu.com/1903-1/
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.25
purl pkg:ebuild/www-servers/apache@2.2.25
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.25
aliases CVE-2013-1896
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8axm-4anr-27ht
3
url VCID-h6km-ryp2-6ufa
vulnerability_id VCID-h6km-ryp2-6ufa
summary
Multiple vulnerabilities have been discovered in Apache HTTP
    Server, possibly allowing remote attackers to execute arbitrary code, cause
    a Denial of Service condition or perform man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6750.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-6750
reference_id
reference_type
scores
0
value 0.81732
scoring_system epss
scoring_elements 0.99192
published_at 2026-04-16T12:55:00Z
1
value 0.82529
scoring_system epss
scoring_elements 0.99223
published_at 2026-04-02T12:55:00Z
2
value 0.82529
scoring_system epss
scoring_elements 0.99226
published_at 2026-04-04T12:55:00Z
3
value 0.82529
scoring_system epss
scoring_elements 0.9923
published_at 2026-04-07T12:55:00Z
4
value 0.82529
scoring_system epss
scoring_elements 0.99222
published_at 2026-04-01T12:55:00Z
5
value 0.82529
scoring_system epss
scoring_elements 0.99232
published_at 2026-04-12T12:55:00Z
6
value 0.82529
scoring_system epss
scoring_elements 0.99233
published_at 2026-04-11T12:55:00Z
7
value 0.82529
scoring_system epss
scoring_elements 0.99231
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-6750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=508238
reference_id 508238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=508238
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=533661
reference_id 533661
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=533661
5
reference_url https://security.gentoo.org/glsa/201309-12
reference_id GLSA-201309-12
reference_type
scores
url https://security.gentoo.org/glsa/201309-12
fixed_packages
0
url pkg:ebuild/www-servers/apache@2.2.25
purl pkg:ebuild/www-servers/apache@2.2.25
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.25
aliases CVE-2007-6750
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6km-ryp2-6ufa
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.2.25