Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-11?arch=el8jbcs
Typerpm
Namespaceredhat
Namejbcs-httpd24-httpd
Version2.4.62-11
Qualifiers
arch el8jbcs
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2d8p-bbc1-hkfa
vulnerability_id VCID-2d8p-bbc1-hkfa
summary
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58098.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58098
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07443
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07398
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08736
published_at 2026-04-13T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08771
published_at 2026-04-09T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08772
published_at 2026-04-11T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.0875
published_at 2026-04-12T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08669
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08745
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419365
reference_id 2419365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419365
6
reference_url https://httpd.apache.org/security/json/CVE-2025-58098.json
reference_id CVE-2025-58098
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-58098.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:0009
reference_id RHSA-2026:0009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0009
11
reference_url https://access.redhat.com/errata/RHSA-2026:0010
reference_id RHSA-2026:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0010
12
reference_url https://access.redhat.com/errata/RHSA-2026:0011
reference_id RHSA-2026:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0011
13
reference_url https://access.redhat.com/errata/RHSA-2026:0012
reference_id RHSA-2026:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0012
14
reference_url https://access.redhat.com/errata/RHSA-2026:0074
reference_id RHSA-2026:0074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0074
15
reference_url https://access.redhat.com/errata/RHSA-2026:0075
reference_id RHSA-2026:0075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0075
16
reference_url https://access.redhat.com/errata/RHSA-2026:0090
reference_id RHSA-2026:0090
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0090
17
reference_url https://access.redhat.com/errata/RHSA-2026:0095
reference_id RHSA-2026:0095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0095
18
reference_url https://access.redhat.com/errata/RHSA-2026:0139
reference_id RHSA-2026:0139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0139
19
reference_url https://access.redhat.com/errata/RHSA-2026:0141
reference_id RHSA-2026:0141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0141
20
reference_url https://access.redhat.com/errata/RHSA-2026:0171
reference_id RHSA-2026:0171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0171
21
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
22
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
23
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
aliases CVE-2025-58098
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2d8p-bbc1-hkfa
1
url VCID-chgr-9utt-kqbp
vulnerability_id VCID-chgr-9utt-kqbp
summary openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69419.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-69419
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.19079
published_at 2026-04-04T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.19027
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19551
published_at 2026-04-13T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19521
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19602
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19654
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19659
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.1961
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-69419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://openssl-library.org/news/secadv/20260127.txt
reference_id 20260127.txt
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/
url https://openssl-library.org/news/secadv/20260127.txt
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2430386
reference_id 2430386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2430386
6
reference_url https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296
reference_id 41be0f216404f14457bbf3b9cc488dba60b49296
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/
url https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296
7
reference_url https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb
reference_id 7e9cac9832e4705b91987c2474ed06a37a93cecb
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/
url https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb
8
reference_url https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2
reference_id a26a90d38edec3748566129d824e664b54bee2e2
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/
url https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2
9
reference_url https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015
reference_id cda12de3bc0e333ea8d2c6fd15001dbdaf280015
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/
url https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015
10
reference_url https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535
reference_id ff628933755075446bca8307e8417c14d164b535
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/
url https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535
11
reference_url https://access.redhat.com/errata/RHSA-2026:1472
reference_id RHSA-2026:1472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1472
12
reference_url https://access.redhat.com/errata/RHSA-2026:1473
reference_id RHSA-2026:1473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1473
13
reference_url https://access.redhat.com/errata/RHSA-2026:1496
reference_id RHSA-2026:1496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1496
14
reference_url https://access.redhat.com/errata/RHSA-2026:1503
reference_id RHSA-2026:1503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1503
15
reference_url https://access.redhat.com/errata/RHSA-2026:1519
reference_id RHSA-2026:1519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1519
16
reference_url https://access.redhat.com/errata/RHSA-2026:1594
reference_id RHSA-2026:1594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1594
17
reference_url https://access.redhat.com/errata/RHSA-2026:1733
reference_id RHSA-2026:1733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1733
18
reference_url https://access.redhat.com/errata/RHSA-2026:1736
reference_id RHSA-2026:1736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1736
19
reference_url https://access.redhat.com/errata/RHSA-2026:2485
reference_id RHSA-2026:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2485
20
reference_url https://access.redhat.com/errata/RHSA-2026:2563
reference_id RHSA-2026:2563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2563
21
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
22
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
23
reference_url https://access.redhat.com/errata/RHSA-2026:3042
reference_id RHSA-2026:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3042
24
reference_url https://access.redhat.com/errata/RHSA-2026:3228
reference_id RHSA-2026:3228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3228
25
reference_url https://access.redhat.com/errata/RHSA-2026:3364
reference_id RHSA-2026:3364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3364
26
reference_url https://access.redhat.com/errata/RHSA-2026:3437
reference_id RHSA-2026:3437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3437
27
reference_url https://access.redhat.com/errata/RHSA-2026:3861
reference_id RHSA-2026:3861
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3861
28
reference_url https://access.redhat.com/errata/RHSA-2026:4163
reference_id RHSA-2026:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4163
29
reference_url https://access.redhat.com/errata/RHSA-2026:4214
reference_id RHSA-2026:4214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4214
30
reference_url https://access.redhat.com/errata/RHSA-2026:4472
reference_id RHSA-2026:4472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4472
31
reference_url https://access.redhat.com/errata/RHSA-2026:4824
reference_id RHSA-2026:4824
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4824
32
reference_url https://access.redhat.com/errata/RHSA-2026:4825
reference_id RHSA-2026:4825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4825
33
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
34
reference_url https://access.redhat.com/errata/RHSA-2026:5214
reference_id RHSA-2026:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5214
35
reference_url https://access.redhat.com/errata/RHSA-2026:5217
reference_id RHSA-2026:5217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5217
36
reference_url https://access.redhat.com/errata/RHSA-2026:5873
reference_id RHSA-2026:5873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5873
37
reference_url https://usn.ubuntu.com/7980-1/
reference_id USN-7980-1
reference_type
scores
url https://usn.ubuntu.com/7980-1/
38
reference_url https://usn.ubuntu.com/7980-2/
reference_id USN-7980-2
reference_type
scores
url https://usn.ubuntu.com/7980-2/
fixed_packages
aliases CVE-2025-69419
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chgr-9utt-kqbp
2
url VCID-fsh3-7b9j-dfgf
vulnerability_id VCID-fsh3-7b9j-dfgf
summary
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-65082.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-65082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-65082
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36463
published_at 2026-04-04T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.3643
published_at 2026-04-02T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37416
published_at 2026-04-13T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37463
published_at 2026-04-09T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37477
published_at 2026-04-11T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37443
published_at 2026-04-12T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37399
published_at 2026-04-07T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37451
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-65082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419139
reference_id 2419139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419139
6
reference_url https://httpd.apache.org/security/json/CVE-2025-65082.json
reference_id CVE-2025-65082
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-65082.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
11
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
12
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
aliases CVE-2025-65082
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fsh3-7b9j-dfgf
3
url VCID-varh-ysfr-euc8
vulnerability_id VCID-varh-ysfr-euc8
summary
mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66200.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66200.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-66200
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17472
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17519
published_at 2026-04-04T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21507
published_at 2026-04-13T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21591
published_at 2026-04-09T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21602
published_at 2026-04-11T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21564
published_at 2026-04-12T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21456
published_at 2026-04-07T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21532
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-66200
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
reference_id 1121926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419262
reference_id 2419262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419262
6
reference_url https://httpd.apache.org/security/json/CVE-2025-66200.json
reference_id CVE-2025-66200
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2025-66200.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23732
reference_id RHSA-2025:23732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23732
8
reference_url https://access.redhat.com/errata/RHSA-2025:23919
reference_id RHSA-2025:23919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23919
9
reference_url https://access.redhat.com/errata/RHSA-2025:23932
reference_id RHSA-2025:23932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23932
10
reference_url https://access.redhat.com/errata/RHSA-2026:2994
reference_id RHSA-2026:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2994
11
reference_url https://access.redhat.com/errata/RHSA-2026:2995
reference_id RHSA-2026:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2995
12
reference_url https://usn.ubuntu.com/7968-1/
reference_id USN-7968-1
reference_type
scores
url https://usn.ubuntu.com/7968-1/
fixed_packages
aliases CVE-2025-66200
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-varh-ysfr-euc8
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.62-11%3Farch=el8jbcs