Search for packages
| purl | pkg:apache/httpd@1.3.39 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-123w-f3zc-37d9
Aliases: CVE-2010-0010 |
An incorrect conversion between numeric types flaw was found in the mod_proxy module which affects some 64-bit architecture systems. A malicious HTTP server to which requests are being proxied could use this flaw to trigger a heap buffer overflow in an httpd child process via a carefully crafted response. |
Affected by 1 other vulnerability. |
|
VCID-dqkp-f1my-dbg9
Aliases: CVE-2007-5000 |
A flaw was found in the mod_imagemap module. On sites where mod_imagemap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible. |
Affected by 2 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 49 other vulnerabilities. |
|
VCID-kgpj-aexq-7kah
Aliases: CVE-2007-6388 |
A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. |
Affected by 2 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 49 other vulnerabilities. |
|
VCID-prd8-51a5-pygj
Aliases: CVE-2011-3368 |
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released. Patches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/ |
Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-j3mb-97k1-uuh9 | A flaw was found in the mod_status module. On sites where the server-status page is publicly accessible and ExtendedStatus is enabled this could lead to a cross-site scripting attack. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. |
CVE-2006-5752
|
| VCID-srxw-jjvr-p3d5 | The Apache HTTP server did not verify that a process was an Apache child process before sending it signals. A local attacker with the ability to run scripts on the HTTP server could manipulate the scoreboard and cause arbitrary processes to be terminated which could lead to a denial of service. |
CVE-2007-3304
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:36:17.559123+00:00 | Apache HTTPD Importer | Affected by | VCID-prd8-51a5-pygj | https://httpd.apache.org/security/json/CVE-2011-3368.json | 38.0.0 |
| 2026-04-01T12:36:16.577579+00:00 | Apache HTTPD Importer | Affected by | VCID-123w-f3zc-37d9 | https://httpd.apache.org/security/json/CVE-2010-0010.json | 38.0.0 |
| 2026-04-01T12:36:14.872524+00:00 | Apache HTTPD Importer | Affected by | VCID-kgpj-aexq-7kah | https://httpd.apache.org/security/json/CVE-2007-6388.json | 38.0.0 |
| 2026-04-01T12:36:14.616389+00:00 | Apache HTTPD Importer | Affected by | VCID-dqkp-f1my-dbg9 | https://httpd.apache.org/security/json/CVE-2007-5000.json | 38.0.0 |
| 2026-04-01T12:36:14.307656+00:00 | Apache HTTPD Importer | Fixing | VCID-srxw-jjvr-p3d5 | https://httpd.apache.org/security/json/CVE-2007-3304.json | 38.0.0 |
| 2026-04-01T12:36:13.944775+00:00 | Apache HTTPD Importer | Fixing | VCID-j3mb-97k1-uuh9 | https://httpd.apache.org/security/json/CVE-2006-5752.json | 38.0.0 |