Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-w2tb-2uvg-g7hv
Summaryhttpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Red Hat Enterprise Linux 8.5
Aliases
0
alias CVE-2021-20325
Fixed_packages
0
url pkg:deb/debian/apache2@0?distro=trixie
purl pkg:deb/debian/apache2@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@0%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20325.json
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20325.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20325
reference_id
reference_type
scores
0
value 0.00933
scoring_system epss
scoring_elements 0.76069
published_at 2026-04-01T12:55:00Z
1
value 0.00933
scoring_system epss
scoring_elements 0.76073
published_at 2026-04-02T12:55:00Z
2
value 0.00933
scoring_system epss
scoring_elements 0.76105
published_at 2026-04-04T12:55:00Z
3
value 0.00933
scoring_system epss
scoring_elements 0.76084
published_at 2026-04-07T12:55:00Z
4
value 0.00933
scoring_system epss
scoring_elements 0.76118
published_at 2026-04-08T12:55:00Z
5
value 0.00933
scoring_system epss
scoring_elements 0.76131
published_at 2026-04-09T12:55:00Z
6
value 0.00933
scoring_system epss
scoring_elements 0.76156
published_at 2026-04-11T12:55:00Z
7
value 0.00933
scoring_system epss
scoring_elements 0.76132
published_at 2026-04-12T12:55:00Z
8
value 0.00933
scoring_system epss
scoring_elements 0.76129
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20325
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017321
reference_id 2017321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017321
3
reference_url https://access.redhat.com/errata/RHSA-2021:4537
reference_id RHSA-2021:4537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4537
Weaknesses
0
cwe_id 918
name Server-Side Request Forgery (SSRF)
description The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Exploits
Severity_range_score9.0 - 9.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-w2tb-2uvg-g7hv