| 0 |
| url |
VCID-4d3t-es7p-9qhn |
| vulnerability_id |
VCID-4d3t-es7p-9qhn |
| summary |
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28615 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78209 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78114 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78131 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78101 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78177 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78181 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78182 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78149 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78153 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78171 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.78146 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.01111 |
| scoring_system |
epss |
| scoring_elements |
0.7814 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28615 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-28615
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4d3t-es7p-9qhn |
|
| 1 |
| url |
VCID-9u53-b79b-cfgd |
| vulnerability_id |
VCID-9u53-b79b-cfgd |
| summary |
Malformed requests may cause the server to dereference a NULL pointer.
This issue affects Apache HTTP Server 2.4.48 and earlier. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-34798 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93141 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93205 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93187 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93191 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.932 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93151 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93162 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93166 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93172 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93169 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.1029 |
| scoring_system |
epss |
| scoring_elements |
0.93171 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-34798 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-34798
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9u53-b79b-cfgd |
|
| 2 |
| url |
VCID-cqjv-6m9n-mfeq |
| vulnerability_id |
VCID-cqjv-6m9n-mfeq |
| summary |
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery).
This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93382 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93448 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93439 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93444 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.9339 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93398 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93406 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93409 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93415 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93414 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.1096 |
| scoring_system |
epss |
| scoring_elements |
0.93434 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-44224
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cqjv-6m9n-mfeq |
|
| 3 |
| url |
VCID-d36c-rrxh-ybgv |
| vulnerability_id |
VCID-d36c-rrxh-ybgv |
| summary |
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29404 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84843 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84818 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84819 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84816 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84738 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84757 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84759 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84781 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84788 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84806 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84802 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.0232 |
| scoring_system |
epss |
| scoring_elements |
0.84797 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29404 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29404
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d36c-rrxh-ybgv |
|
| 4 |
| url |
VCID-db6k-j9mj-e7hy |
| vulnerability_id |
VCID-db6k-j9mj-e7hy |
| summary |
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning.
This issue affects Apache HTTP Server 2.4.17 to 2.4.48. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-33193 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.68629 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00569 |
| scoring_system |
epss |
| scoring_elements |
0.6858 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72841 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72879 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72839 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72846 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.729 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72934 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72943 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72892 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00739 |
| scoring_system |
epss |
| scoring_elements |
0.72917 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-33193 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-33193
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-db6k-j9mj-e7hy |
|
| 5 |
| url |
VCID-g55m-t4s1-nfhv |
| vulnerability_id |
VCID-g55m-t4s1-nfhv |
| summary |
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data.
This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23943 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98295 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98293 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98292 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98273 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98275 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.9828 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98281 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98284 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98285 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98286 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.60552 |
| scoring_system |
epss |
| scoring_elements |
0.98291 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23943 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-23943
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g55m-t4s1-nfhv |
|
| 6 |
| url |
VCID-gv84-vfvh-y7hu |
| vulnerability_id |
VCID-gv84-vfvh-y7hu |
| summary |
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-30522 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93677 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93662 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93669 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93672 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93616 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93625 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93627 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93636 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93638 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93643 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.11589 |
| scoring_system |
epss |
| scoring_elements |
0.93644 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-30522 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-30522
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gv84-vfvh-y7hu |
|
| 7 |
| url |
VCID-hm3f-m22n-u3gy |
| vulnerability_id |
VCID-hm3f-m22n-u3gy |
| summary |
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-30556 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66286 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66264 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66279 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66263 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66195 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66222 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66192 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6624 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66253 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66273 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6626 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66229 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-30556 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-30556
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hm3f-m22n-u3gy |
|
| 8 |
| url |
VCID-na94-5565-dyfc |
| vulnerability_id |
VCID-na94-5565-dyfc |
| summary |
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.
Modules compiled and distributed separately from Apache HTTP Server that use the "ap_rputs" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28614 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69346 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69266 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69305 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69314 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.6922 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.6924 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69221 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69271 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69289 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69311 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69295 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28614 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-28614
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-na94-5565-dyfc |
|
| 9 |
| url |
VCID-p2a1-afnh-7qca |
| vulnerability_id |
VCID-p2a1-afnh-7qca |
| summary |
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism.
This may be used to bypass IP based authentication on the origin server/application. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-31813 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11369 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11511 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13252 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13379 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13443 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13161 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1316 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13247 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13305 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13255 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-31813 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-31813
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p2a1-afnh-7qca |
|
| 10 |
| url |
VCID-pnc8-bb23-vqh1 |
| vulnerability_id |
VCID-pnc8-bb23-vqh1 |
| summary |
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash.
This issue affects Apache HTTP Server 2.4.52 and earlier. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22719 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.29312 |
| scoring_system |
epss |
| scoring_elements |
0.96593 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.29312 |
| scoring_system |
epss |
| scoring_elements |
0.96591 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.29312 |
| scoring_system |
epss |
| scoring_elements |
0.96578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.29312 |
| scoring_system |
epss |
| scoring_elements |
0.96581 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.29312 |
| scoring_system |
epss |
| scoring_elements |
0.96589 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.29312 |
| scoring_system |
epss |
| scoring_elements |
0.96573 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.29423 |
| scoring_system |
epss |
| scoring_elements |
0.96617 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.29423 |
| scoring_system |
epss |
| scoring_elements |
0.96608 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.29423 |
| scoring_system |
epss |
| scoring_elements |
0.96613 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.29423 |
| scoring_system |
epss |
| scoring_elements |
0.96599 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.29423 |
| scoring_system |
epss |
| scoring_elements |
0.96602 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22719 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-22719
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pnc8-bb23-vqh1 |
|
| 11 |
| url |
VCID-qm7e-n9ay-hufy |
| vulnerability_id |
VCID-qm7e-n9ay-hufy |
| summary |
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26377 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.39296 |
| scoring_system |
epss |
| scoring_elements |
0.97287 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.39296 |
| scoring_system |
epss |
| scoring_elements |
0.97297 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.39296 |
| scoring_system |
epss |
| scoring_elements |
0.97289 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.39296 |
| scoring_system |
epss |
| scoring_elements |
0.97301 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.39296 |
| scoring_system |
epss |
| scoring_elements |
0.97299 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.39296 |
| scoring_system |
epss |
| scoring_elements |
0.97288 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.3988 |
| scoring_system |
epss |
| scoring_elements |
0.9732 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.3988 |
| scoring_system |
epss |
| scoring_elements |
0.97308 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.3988 |
| scoring_system |
epss |
| scoring_elements |
0.97313 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.3988 |
| scoring_system |
epss |
| scoring_elements |
0.97314 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.3988 |
| scoring_system |
epss |
| scoring_elements |
0.97321 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26377 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-26377
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qm7e-n9ay-hufy |
|
| 12 |
| url |
VCID-rdtq-8ng5-53fn |
| vulnerability_id |
VCID-rdtq-8ng5-53fn |
| summary |
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS).
This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36160 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.8792 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.88006 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.87977 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.87991 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.8799 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.8793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.87943 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.87947 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.87968 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.87974 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.87985 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.03716 |
| scoring_system |
epss |
| scoring_elements |
0.87978 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-36160 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-36160
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rdtq-8ng5-53fn |
|
| 13 |
| url |
VCID-wrw6-uzz4-rkfb |
| vulnerability_id |
VCID-wrw6-uzz4-rkfb |
| summary |
ap_escape_quotes() may write beyond the end of a buffer when given malicious input.
No included modules pass untrusted data to these functions, but third-party / external modules may.
This issue affects Apache HTTP Server 2.4.48 and earlier. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39275 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97171 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97213 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97199 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97207 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97209 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97177 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97183 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97193 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97194 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.37674 |
| scoring_system |
epss |
| scoring_elements |
0.97198 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-39275 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-39275
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wrw6-uzz4-rkfb |
|
| 14 |
| url |
VCID-xfm9-e5nr-wyat |
| vulnerability_id |
VCID-xfm9-e5nr-wyat |
| summary |
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes.
This issue affects Apache HTTP Server 2.4.52 and earlier. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.13159 |
| scoring_system |
epss |
| scoring_elements |
0.94126 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.13159 |
| scoring_system |
epss |
| scoring_elements |
0.94121 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.13159 |
| scoring_system |
epss |
| scoring_elements |
0.94104 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.13159 |
| scoring_system |
epss |
| scoring_elements |
0.94108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.13159 |
| scoring_system |
epss |
| scoring_elements |
0.94117 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.13159 |
| scoring_system |
epss |
| scoring_elements |
0.94093 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.13224 |
| scoring_system |
epss |
| scoring_elements |
0.94166 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.13224 |
| scoring_system |
epss |
| scoring_elements |
0.94165 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.13224 |
| scoring_system |
epss |
| scoring_elements |
0.94164 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.13224 |
| scoring_system |
epss |
| scoring_elements |
0.94143 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.13224 |
| scoring_system |
epss |
| scoring_elements |
0.94159 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-22721
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xfm9-e5nr-wyat |
|