Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
Typedeb
Namespacedebian
Namelibapache-mod-jk
Version1:1.2.48-2+deb12u2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:1.2.49-1
Latest_non_vulnerable_version1:1.2.50-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2n2t-jyg7-gbev
vulnerability_id VCID-2n2t-jyg7-gbev
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8111.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8111
reference_id
reference_type
scores
0
value 0.03739
scoring_system epss
scoring_elements 0.88023
published_at 2026-04-18T12:55:00Z
1
value 0.03739
scoring_system epss
scoring_elements 0.87951
published_at 2026-04-01T12:55:00Z
2
value 0.03739
scoring_system epss
scoring_elements 0.87962
published_at 2026-04-02T12:55:00Z
3
value 0.03739
scoring_system epss
scoring_elements 0.87976
published_at 2026-04-04T12:55:00Z
4
value 0.03739
scoring_system epss
scoring_elements 0.87979
published_at 2026-04-07T12:55:00Z
5
value 0.03739
scoring_system epss
scoring_elements 0.88
published_at 2026-04-08T12:55:00Z
6
value 0.03739
scoring_system epss
scoring_elements 0.88007
published_at 2026-04-09T12:55:00Z
7
value 0.03739
scoring_system epss
scoring_elements 0.88017
published_at 2026-04-11T12:55:00Z
8
value 0.03739
scoring_system epss
scoring_elements 0.8801
published_at 2026-04-12T12:55:00Z
9
value 0.03739
scoring_system epss
scoring_elements 0.88011
published_at 2026-04-13T12:55:00Z
10
value 0.03739
scoring_system epss
scoring_elements 0.88024
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8111
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8111
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1182591
reference_id 1182591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1182591
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783233
reference_id 783233
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783233
6
reference_url https://access.redhat.com/errata/RHSA-2015:0846
reference_id RHSA-2015:0846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0846
7
reference_url https://access.redhat.com/errata/RHSA-2015:0847
reference_id RHSA-2015:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0847
8
reference_url https://access.redhat.com/errata/RHSA-2015:0848
reference_id RHSA-2015:0848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0848
9
reference_url https://access.redhat.com/errata/RHSA-2015:0849
reference_id RHSA-2015:0849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0849
10
reference_url https://access.redhat.com/errata/RHSA-2015:1641
reference_id RHSA-2015:1641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1641
11
reference_url https://access.redhat.com/errata/RHSA-2015:1642
reference_id RHSA-2015:1642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1642
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@1:1.2.40%2Bsvn150520-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.40%2Bsvn150520-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.40%252Bsvn150520-1%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2014-8111
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2n2t-jyg7-gbev
1
url VCID-3knx-sscv-x3bb
vulnerability_id VCID-3knx-sscv-x3bb
summary mod_jk: Buffer overflow when concatenating virtual host name and URI
references
0
reference_url http://packetstormsecurity.com/files/139071/Apache-Tomcat-JK-ISAPI-Connector-1.2.41-Buffer-Overflow.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/139071/Apache-Tomcat-JK-ISAPI-Connector-1.2.41-Buffer-Overflow.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-2957.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2957.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6808.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6808.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6808
reference_id
reference_type
scores
0
value 0.29479
scoring_system epss
scoring_elements 0.96617
published_at 2026-04-18T12:55:00Z
1
value 0.29479
scoring_system epss
scoring_elements 0.96604
published_at 2026-04-12T12:55:00Z
2
value 0.29479
scoring_system epss
scoring_elements 0.96606
published_at 2026-04-13T12:55:00Z
3
value 0.29479
scoring_system epss
scoring_elements 0.96612
published_at 2026-04-16T12:55:00Z
4
value 0.29479
scoring_system epss
scoring_elements 0.96584
published_at 2026-04-02T12:55:00Z
5
value 0.29479
scoring_system epss
scoring_elements 0.96589
published_at 2026-04-04T12:55:00Z
6
value 0.29479
scoring_system epss
scoring_elements 0.96592
published_at 2026-04-07T12:55:00Z
7
value 0.29479
scoring_system epss
scoring_elements 0.966
published_at 2026-04-08T12:55:00Z
8
value 0.29479
scoring_system epss
scoring_elements 0.96602
published_at 2026-04-09T12:55:00Z
9
value 0.29479
scoring_system epss
scoring_elements 0.96603
published_at 2026-04-11T12:55:00Z
10
value 0.30937
scoring_system epss
scoring_elements 0.96706
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6808
4
reference_url http://seclists.org/fulldisclosure/2016/Oct/44
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2016/Oct/44
5
reference_url https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
11
reference_url http://tomcat.apache.org/security-jk.html
reference_id
reference_type
scores
url http://tomcat.apache.org/security-jk.html
12
reference_url http://www.openwall.com/lists/oss-security/2016/10/06/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/10/06/4
13
reference_url http://www.securityfocus.com/bid/93429
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/93429
14
reference_url http://www.securitytracker.com/id/1036969
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036969
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1382352
reference_id 1382352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1382352
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-6808
reference_id CVE-2016-6808
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-6808
18
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
19
reference_url https://access.redhat.com/errata/RHSA-2017:0193
reference_id RHSA-2017:0193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0193
20
reference_url https://access.redhat.com/errata/RHSA-2017:0194
reference_id RHSA-2017:0194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0194
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@0?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@0%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2016-6808
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3knx-sscv-x3bb
2
url VCID-43bm-gb6c-9ugb
vulnerability_id VCID-43bm-gb6c-9ugb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11759.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11759
reference_id
reference_type
scores
0
value 0.94254
scoring_system epss
scoring_elements 0.99932
published_at 2026-04-04T12:55:00Z
1
value 0.94254
scoring_system epss
scoring_elements 0.99933
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11759
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11759
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1645589
reference_id 1645589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1645589
5
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
6
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@1:1.2.46-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.46-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.46-1%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2018-11759
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-43bm-gb6c-9ugb
3
url VCID-9p71-wr2h-4qdp
vulnerability_id VCID-9p71-wr2h-4qdp
summary A directory traversal vulnerability has been discovered in Apache mod_jk.
references
0
reference_url http://docs.info.apple.com/article.html?artnum=306172
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=306172
1
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
2
reference_url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1860.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1860.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1860
reference_id
reference_type
scores
0
value 0.24507
scoring_system epss
scoring_elements 0.96132
published_at 2026-04-18T12:55:00Z
1
value 0.24507
scoring_system epss
scoring_elements 0.96081
published_at 2026-04-01T12:55:00Z
2
value 0.24507
scoring_system epss
scoring_elements 0.96088
published_at 2026-04-02T12:55:00Z
3
value 0.24507
scoring_system epss
scoring_elements 0.96094
published_at 2026-04-04T12:55:00Z
4
value 0.24507
scoring_system epss
scoring_elements 0.961
published_at 2026-04-07T12:55:00Z
5
value 0.24507
scoring_system epss
scoring_elements 0.9611
published_at 2026-04-08T12:55:00Z
6
value 0.24507
scoring_system epss
scoring_elements 0.96113
published_at 2026-04-09T12:55:00Z
7
value 0.24507
scoring_system epss
scoring_elements 0.96116
published_at 2026-04-12T12:55:00Z
8
value 0.24507
scoring_system epss
scoring_elements 0.96118
published_at 2026-04-13T12:55:00Z
9
value 0.24507
scoring_system epss
scoring_elements 0.96127
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1860
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860
7
reference_url http://secunia.com/advisories/25383
reference_id
reference_type
scores
url http://secunia.com/advisories/25383
8
reference_url http://secunia.com/advisories/25701
reference_id
reference_type
scores
url http://secunia.com/advisories/25701
9
reference_url http://secunia.com/advisories/26235
reference_id
reference_type
scores
url http://secunia.com/advisories/26235
10
reference_url http://secunia.com/advisories/26512
reference_id
reference_type
scores
url http://secunia.com/advisories/26512
11
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
12
reference_url http://secunia.com/advisories/29242
reference_id
reference_type
scores
url http://secunia.com/advisories/29242
13
reference_url http://security.gentoo.org/glsa/glsa-200708-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200708-15.xml
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/34496
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/34496
15
reference_url https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
24
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6002
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6002
25
reference_url http://tomcat.apache.org/connectors-doc/news/20070301.html#20070518.1
reference_id
reference_type
scores
url http://tomcat.apache.org/connectors-doc/news/20070301.html#20070518.1
26
reference_url http://tomcat.apache.org/security-jk.html
reference_id
reference_type
scores
url http://tomcat.apache.org/security-jk.html
27
reference_url http://www.debian.org/security/2007/dsa-1312
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1312
28
reference_url http://www.osvdb.org/34877
reference_id
reference_type
scores
url http://www.osvdb.org/34877
29
reference_url http://www.redhat.com/support/errata/RHSA-2007-0379.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0379.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0261.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0261.html
31
reference_url http://www.securityfocus.com/bid/24147
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24147
32
reference_url http://www.securityfocus.com/bid/25159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25159
33
reference_url http://www.securitytracker.com/id?1018138
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018138
34
reference_url http://www.vupen.com/english/advisories/2007/1941
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1941
35
reference_url http://www.vupen.com/english/advisories/2007/2732
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2732
36
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=237656
reference_id 237656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=237656
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425836
reference_id 425836
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425836
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat_jk_web_server_connector:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat_jk_web_server_connector:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat_jk_web_server_connector:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1860
reference_id CVE-2007-1860
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2007-1860
41
reference_url https://security.gentoo.org/glsa/200708-15
reference_id GLSA-200708-15
reference_type
scores
url https://security.gentoo.org/glsa/200708-15
42
reference_url https://access.redhat.com/errata/RHSA-2007:0379
reference_id RHSA-2007:0379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0379
43
reference_url https://access.redhat.com/errata/RHSA-2007:0380
reference_id RHSA-2007:0380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0380
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@1:1.2.23-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.23-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.23-1%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2007-1860
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9p71-wr2h-4qdp
4
url VCID-hkjk-hbt1-q7cd
vulnerability_id VCID-hkjk-hbt1-q7cd
summary mod_jk: information Disclosure / DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46544.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-46544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-46544
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11637
published_at 2026-04-18T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11839
published_at 2026-04-11T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.118
published_at 2026-04-12T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11774
published_at 2026-04-13T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.1186
published_at 2026-04-02T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11904
published_at 2026-04-04T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11691
published_at 2026-04-07T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11776
published_at 2026-04-08T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11829
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-46544
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46544
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082713
reference_id 1082713
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082713
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314194
reference_id 2314194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314194
6
reference_url https://lists.apache.org/thread/q1gp7cc38hs1r8gj8gfnopwznd5fpr4d
reference_id q1gp7cc38hs1r8gj8gfnopwznd5fpr4d
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T17:36:05Z/
url https://lists.apache.org/thread/q1gp7cc38hs1r8gj8gfnopwznd5fpr4d
7
reference_url https://access.redhat.com/errata/RHSA-2024:6927
reference_id RHSA-2024:6927
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6927
8
reference_url https://access.redhat.com/errata/RHSA-2024:6928
reference_id RHSA-2024:6928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6928
9
reference_url https://access.redhat.com/errata/RHSA-2024:7457
reference_id RHSA-2024:7457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7457
10
reference_url https://access.redhat.com/errata/RHSA-2024:8928
reference_id RHSA-2024:8928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8928
11
reference_url https://access.redhat.com/errata/RHSA-2024:8929
reference_id RHSA-2024:8929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8929
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2024-46544
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkjk-hbt1-q7cd
5
url VCID-k4yh-s3ds-m7er
vulnerability_id VCID-k4yh-s3ds-m7er
summary
An error in the Apache Tomcat JK Connector might allow for an information
    disclosure flaw.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5519.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5519
reference_id
reference_type
scores
0
value 0.04557
scoring_system epss
scoring_elements 0.89146
published_at 2026-04-01T12:55:00Z
1
value 0.04557
scoring_system epss
scoring_elements 0.89153
published_at 2026-04-02T12:55:00Z
2
value 0.04557
scoring_system epss
scoring_elements 0.89169
published_at 2026-04-04T12:55:00Z
3
value 0.04557
scoring_system epss
scoring_elements 0.89171
published_at 2026-04-07T12:55:00Z
4
value 0.04557
scoring_system epss
scoring_elements 0.89189
published_at 2026-04-08T12:55:00Z
5
value 0.04557
scoring_system epss
scoring_elements 0.89194
published_at 2026-04-09T12:55:00Z
6
value 0.04557
scoring_system epss
scoring_elements 0.89204
published_at 2026-04-11T12:55:00Z
7
value 0.04557
scoring_system epss
scoring_elements 0.892
published_at 2026-04-12T12:55:00Z
8
value 0.04557
scoring_system epss
scoring_elements 0.89197
published_at 2026-04-13T12:55:00Z
9
value 0.04557
scoring_system epss
scoring_elements 0.8921
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=490201
reference_id 490201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=490201
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523054
reference_id 523054
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523054
5
reference_url https://security.gentoo.org/glsa/200906-04
reference_id GLSA-200906-04
reference_type
scores
url https://security.gentoo.org/glsa/200906-04
6
reference_url https://access.redhat.com/errata/RHSA-2009:1087
reference_id RHSA-2009:1087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1087
7
reference_url https://access.redhat.com/errata/RHSA-2009:1618
reference_id RHSA-2009:1618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1618
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@1:1.2.26-2.1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.26-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.26-2.1%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2008-5519
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yh-s3ds-m7er
6
url VCID-neum-zker-wbe2
vulnerability_id VCID-neum-zker-wbe2
summary httpd: Apache Tomcat Connectors (mod_jk) Information Disclosure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41081.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41081
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10591
published_at 2026-04-08T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10492
published_at 2026-04-18T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10652
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10518
published_at 2026-04-07T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10651
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10664
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10632
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10608
published_at 2026-04-13T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10473
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41081
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051956
reference_id 1051956
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051956
5
reference_url https://www.openwall.com/lists/oss-security/2023/09/13/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T17:18:39Z/
url https://www.openwall.com/lists/oss-security/2023/09/13/2
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238847
reference_id 2238847
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238847
7
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/7
reference_id 7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T17:18:39Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/7
8
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T17:18:39Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00027.html
9
reference_url https://lists.apache.org/thread/rd1r26w7271jyqgzr4492tooyt583d8b
reference_id rd1r26w7271jyqgzr4492tooyt583d8b
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-25T17:18:39Z/
url https://lists.apache.org/thread/rd1r26w7271jyqgzr4492tooyt583d8b
10
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
11
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
12
reference_url https://access.redhat.com/errata/RHSA-2024:2387
reference_id RHSA-2024:2387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2387
13
reference_url https://usn.ubuntu.com/6826-1/
reference_id USN-6826-1
reference_type
scores
url https://usn.ubuntu.com/6826-1/
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.49-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.49-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.49-1%3Fdistro=trixie
4
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2023-41081
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-neum-zker-wbe2
7
url VCID-y2ux-nm69-uuam
vulnerability_id VCID-y2ux-nm69-uuam
summary
The Apache Tomcat Connector (mod_jk) contains a buffer overflow
    vulnerability that could result in the remote execution of arbitrary code.
references
0
reference_url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
reference_id
reference_type
scores
url http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0774.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0774.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0774
reference_id
reference_type
scores
0
value 0.88357
scoring_system epss
scoring_elements 0.99499
published_at 2026-04-18T12:55:00Z
1
value 0.88357
scoring_system epss
scoring_elements 0.9949
published_at 2026-04-01T12:55:00Z
2
value 0.88357
scoring_system epss
scoring_elements 0.99489
published_at 2026-04-02T12:55:00Z
3
value 0.88357
scoring_system epss
scoring_elements 0.99491
published_at 2026-04-04T12:55:00Z
4
value 0.88357
scoring_system epss
scoring_elements 0.99493
published_at 2026-04-07T12:55:00Z
5
value 0.88357
scoring_system epss
scoring_elements 0.99494
published_at 2026-04-08T12:55:00Z
6
value 0.88357
scoring_system epss
scoring_elements 0.99495
published_at 2026-04-13T12:55:00Z
7
value 0.88357
scoring_system epss
scoring_elements 0.99496
published_at 2026-04-12T12:55:00Z
8
value 0.88357
scoring_system epss
scoring_elements 0.99498
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0774
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774
4
reference_url http://secunia.com/advisories/24398
reference_id
reference_type
scores
url http://secunia.com/advisories/24398
5
reference_url http://secunia.com/advisories/24558
reference_id
reference_type
scores
url http://secunia.com/advisories/24558
6
reference_url http://secunia.com/advisories/27037
reference_id
reference_type
scores
url http://secunia.com/advisories/27037
7
reference_url http://secunia.com/advisories/28711
reference_id
reference_type
scores
url http://secunia.com/advisories/28711
8
reference_url http://securitytracker.com/id?1017719
reference_id
reference_type
scores
url http://securitytracker.com/id?1017719
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/32794
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/32794
10
reference_url https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5513
17
reference_url http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html
reference_id
reference_type
scores
url http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html
18
reference_url http://tomcat.apache.org/security-jk.html
reference_id
reference_type
scores
url http://tomcat.apache.org/security-jk.html
19
reference_url http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml
reference_id
reference_type
scores
url http://www.cisco.com/en/US/products/products_security_advisory09186a008093f040.shtml
20
reference_url http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200703-16.xml
21
reference_url http://www.redhat.com/support/errata/RHSA-2007-0096.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0096.html
22
reference_url http://www.securityfocus.com/archive/1/461734/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/461734/100/0/threaded
23
reference_url http://www.securityfocus.com/bid/22791
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22791
24
reference_url http://www.vupen.com/english/advisories/2007/0809
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0809
25
reference_url http://www.vupen.com/english/advisories/2007/3386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3386
26
reference_url http://www.vupen.com/english/advisories/2008/0331
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0331
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618272
reference_id 1618272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618272
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.19:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:tomcat_jk_web_server_connector:1.2.20:*:*:*:*:*:*:*
30
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/4162.c
reference_id CVE-2007-0774
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/4162.c
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0774
reference_id CVE-2007-0774
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0774
32
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16798.rb
reference_id CVE-2007-0774;OSVDB-33855
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16798.rb
33
reference_url http://www.zerodayinitiative.com/advisories/ZDI-07-008.html
reference_id CVE-2007-0774;OSVDB-33855
reference_type exploit
scores
url http://www.zerodayinitiative.com/advisories/ZDI-07-008.html
34
reference_url https://security.gentoo.org/glsa/200703-16
reference_id GLSA-200703-16
reference_type
scores
url https://security.gentoo.org/glsa/200703-16
35
reference_url https://access.redhat.com/errata/RHSA-2007:0096
reference_id RHSA-2007:0096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0096
36
reference_url https://access.redhat.com/errata/RHSA-2007:0164
reference_id RHSA-2007:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0164
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@1:1.2.21-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.21-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.21-1%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2007-0774
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2ux-nm69-uuam
8
url VCID-ycnp-f24s-n7dy
vulnerability_id VCID-ycnp-f24s-n7dy
summary isapi_redirect: Mishandled HTTP request paths in jk_isapi_plugin.c can lead to unintended exposure of application resources via the reverse proxy
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1323.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1323.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1323
reference_id
reference_type
scores
0
value 0.53851
scoring_system epss
scoring_elements 0.97983
published_at 2026-04-01T12:55:00Z
1
value 0.53851
scoring_system epss
scoring_elements 0.97987
published_at 2026-04-02T12:55:00Z
2
value 0.53851
scoring_system epss
scoring_elements 0.97989
published_at 2026-04-04T12:55:00Z
3
value 0.53851
scoring_system epss
scoring_elements 0.97991
published_at 2026-04-07T12:55:00Z
4
value 0.53851
scoring_system epss
scoring_elements 0.97996
published_at 2026-04-08T12:55:00Z
5
value 0.53851
scoring_system epss
scoring_elements 0.97997
published_at 2026-04-09T12:55:00Z
6
value 0.53851
scoring_system epss
scoring_elements 0.98001
published_at 2026-04-11T12:55:00Z
7
value 0.53851
scoring_system epss
scoring_elements 0.98002
published_at 2026-04-12T12:55:00Z
8
value 0.53851
scoring_system epss
scoring_elements 0.98003
published_at 2026-04-13T12:55:00Z
9
value 0.53851
scoring_system epss
scoring_elements 0.98008
published_at 2026-04-16T12:55:00Z
10
value 0.53851
scoring_system epss
scoring_elements 0.98009
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1323
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1554647
reference_id 1554647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1554647
3
reference_url https://access.redhat.com/errata/RHSA-2018:1843
reference_id RHSA-2018:1843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1843
fixed_packages
0
url pkg:deb/debian/libapache-mod-jk@0?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@0%3Fdistro=trixie
1
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
purl pkg:deb/debian/libapache-mod-jk@1:1.2.50-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.50-1%3Fdistro=trixie
aliases CVE-2018-1323
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycnp-f24s-n7dy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache-mod-jk@1:1.2.48-2%252Bdeb12u2%3Fdistro=trixie