Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-35pg-v3ae-8kct
SummaryThe default configuration of Apache 2.0.40, as shipped with Red Hat Linux 9.0, allows remote attackers to list directory contents, even if auto indexing is turned off and there is a default web page configured, via a GET request containing a double slash (//).
Aliases
0
alias CVE-2003-1138
Fixed_packages
0
url pkg:deb/debian/apache2@0?distro=trixie
purl pkg:deb/debian/apache2@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@0%3Fdistro=trixie
1
url pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/apache2@2.4.66-8?distro=trixie
purl pkg:deb/debian/apache2@2.4.66-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-1138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-1138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-1138
reference_id
reference_type
scores
0
value 0.05234
scoring_system epss
scoring_elements 0.89922
published_at 2026-04-01T12:55:00Z
1
value 0.05234
scoring_system epss
scoring_elements 0.89926
published_at 2026-04-02T12:55:00Z
2
value 0.05234
scoring_system epss
scoring_elements 0.89938
published_at 2026-04-04T12:55:00Z
3
value 0.05234
scoring_system epss
scoring_elements 0.89944
published_at 2026-04-07T12:55:00Z
4
value 0.05234
scoring_system epss
scoring_elements 0.8996
published_at 2026-04-08T12:55:00Z
5
value 0.05234
scoring_system epss
scoring_elements 0.89966
published_at 2026-04-09T12:55:00Z
6
value 0.05234
scoring_system epss
scoring_elements 0.89974
published_at 2026-04-11T12:55:00Z
7
value 0.05234
scoring_system epss
scoring_elements 0.89972
published_at 2026-04-12T12:55:00Z
8
value 0.05234
scoring_system epss
scoring_elements 0.89965
published_at 2026-04-13T12:55:00Z
9
value 0.05234
scoring_system epss
scoring_elements 0.8998
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-1138
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/23296.txt
reference_id CVE-2003-1138;OSVDB-19137
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/23296.txt
3
reference_url https://www.securityfocus.com/bid/8898/info
reference_id CVE-2003-1138;OSVDB-19137
reference_type exploit
scores
url https://www.securityfocus.com/bid/8898/info
Weaknesses
Exploits
0
date_added 2003-10-27
description RedHat Apache 2.0.40 - Directory Index Default Configuration Error
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2003-10-27
exploit_type remote
platform linux
source_date_updated 2012-12-11
data_source Exploit-DB
source_url https://www.securityfocus.com/bid/8898/info
Severity_range_scorenull
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-35pg-v3ae-8kct