Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/apache2@0?distro=trixie
purl pkg:deb/debian/apache2@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (25)
Vulnerability Summary Aliases
VCID-27q1-umct-1qe3 Unspecified vulnerability in mod_proxy_balancer for Apache HTTP Server 2.2.x before 2.2.7-dev, when running on Windows, allows remote attackers to trigger memory corruption via a long URL. NOTE: the vendor could not reproduce this issue CVE-2007-6423
VCID-35pg-v3ae-8kct The default configuration of Apache 2.0.40, as shipped with Red Hat Linux 9.0, allows remote attackers to list directory contents, even if auto indexing is turned off and there is a default web page configured, via a GET request containing a double slash (//). CVE-2003-1138
VCID-4jfa-3r1g-m7h8 SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. CVE-2024-40898
VCID-699n-tvdd-qkgj The recall_headers function in mod_mem_cache in Apache 2.2.4 did not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information. CVE-2007-1862
VCID-7krj-8vat-3ydy A flaw was found with within mod_isapi which would attempt to unload the ISAPI dll when it encountered various error states. This could leave the callbacks in an undefined state and result in a segfault. On Windows platforms using mod_isapi, a remote attacker could send a malicious request to trigger this issue, and as win32 MPM runs only one process, this would result in a denial of service, and potentially allow arbitrary code execution. CVE-2010-0425
VCID-91u7-vh6n-v7fm Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows CVE-2020-13938
VCID-a38m-yzz2-qfcv The default configuration of the Apache HTTP Server on Apple OS X before 10.10.4 does not enable the mod_hfs_apple module, which allows remote attackers to bypass HTTP authentication via a crafted URL. CVE-2015-3675
VCID-b9ks-detx-nkdw Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication. CVE-2024-43394
VCID-dg2r-uz3a-dug5 Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module. CVE-2022-28330
VCID-drp9-bvkd-4kaq An information disclosure flaw was found in mod_proxy_http in versions 2.2.9 through 2.2.15, 2.3.4-alpha and 2.3.5-alpha. Under certain timeout conditions, the server could return a response intended for another user. Only Windows, Netware and OS2 operating systems are affected. Only those configurations which trigger the use of proxy worker pools are affected. There was no vulnerability on earlier versions, as proxy pools were not yet introduced. The simplest workaround is to globally configure; SetEnv proxy-nokeepalive 1 CVE-2010-2068
VCID-ehff-j1pz-b7e8 The modules mod_proxy_ajp and mod_proxy_http did not always close the connection to the back end server when necessary as part of error handling. This could lead to an information disclosure due to a response mixup between users. CVE-2012-3502
VCID-ese4-47tg-efbw Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory. CVE-2012-0883
VCID-ffpe-1ctd-77e9 A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. CVE-2021-41773
VCID-ge2x-rh2r-kqb2 httpd: # character matches all IPs CVE-2017-12171
VCID-hj5r-jms3-x3fe While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project. CVE-2021-41524
VCID-khfr-kgtb-rfam When under stress, closing many connections, the HTTP/2 handling code would sometimes access memory after it has been freed, resulting in potentially erratic behaviour. CVE-2017-9789
VCID-nbar-1p1f-bqfk SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing. CVE-2024-38472
VCID-pru9-2rza-qycd Server-Side Request Forgery (SSRF) vulnerability  in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off  allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.66, which fixes the issue. CVE-2025-59775
VCID-pz6f-mahv-hue8 A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.61, which fixes this issue. CVE-2024-39884
VCID-qn74-neyt-jkg9 It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions. CVE-2021-42013
VCID-rhwb-4vyp-8kf2 A flaw was found in the WinNT MPM in httpd versions 2.4.1 to 2.4.9, when using the default AcceptFilter for that platform. A remote attacker could send carefully crafted requests that would leak memory and eventually lead to a denial of service against the server. CVE-2014-3523
VCID-tcmz-a5dq-d7cj A crash in ErrorDocument handling was found. If ErrorDocument 400 was configured pointing to a local URL-path with the INCLUDES filter active, a NULL dereference would occur when handling the error, causing the child process to crash. This issue affected the 2.4.12 release only. CVE-2015-0253
VCID-w2tb-2uvg-g7hv httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Red Hat Enterprise Linux 8.5 CVE-2021-20325
VCID-wg13-h6gt-r7h5 Apache 2.2.2, when running on Windows, allows remote attackers to read source code of CGI programs via a request that contains uppercase (or alternate case) characters that bypass the case-sensitive ScriptAlias directive, but allow access to the file on case-insensitive file systems. CVE-2006-4110
VCID-xhtj-rr3y-puc7 A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests evaluating as "true". Users are recommended to upgrade to version 2.4.65, which fixes the issue. CVE-2025-54090

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:26:46.065829+00:00 Debian Importer Fixing VCID-7krj-8vat-3ydy https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:17:33.641448+00:00 Debian Importer Fixing VCID-tcmz-a5dq-d7cj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:06:53.361277+00:00 Debian Importer Fixing VCID-pru9-2rza-qycd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:55:17.158210+00:00 Debian Importer Fixing VCID-ese4-47tg-efbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:51:45.397518+00:00 Debian Importer Fixing VCID-dg2r-uz3a-dug5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:42:16.477648+00:00 Debian Importer Fixing VCID-qn74-neyt-jkg9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:37:52.465125+00:00 Debian Importer Fixing VCID-khfr-kgtb-rfam https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:18.788936+00:00 Debian Importer Fixing VCID-rhwb-4vyp-8kf2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:38:51.730367+00:00 Debian Importer Fixing VCID-drp9-bvkd-4kaq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:11.978088+00:00 Debian Importer Fixing VCID-699n-tvdd-qkgj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:16:22.737242+00:00 Debian Importer Fixing VCID-ge2x-rh2r-kqb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:06:06.526703+00:00 Debian Importer Fixing VCID-hj5r-jms3-x3fe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:01:22.975900+00:00 Debian Importer Fixing VCID-xhtj-rr3y-puc7 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:54:55.603699+00:00 Debian Importer Fixing VCID-wg13-h6gt-r7h5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:50:34.203078+00:00 Debian Importer Fixing VCID-ffpe-1ctd-77e9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:29:13.130027+00:00 Debian Importer Fixing VCID-b9ks-detx-nkdw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:29.804464+00:00 Debian Importer Fixing VCID-35pg-v3ae-8kct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:01:57.615524+00:00 Debian Importer Fixing VCID-a38m-yzz2-qfcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:54:07.713931+00:00 Debian Importer Fixing VCID-nbar-1p1f-bqfk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:49:03.115483+00:00 Debian Importer Fixing VCID-w2tb-2uvg-g7hv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:39.141816+00:00 Debian Importer Fixing VCID-27q1-umct-1qe3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:10:34.728353+00:00 Debian Importer Fixing VCID-pz6f-mahv-hue8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:53:40.438101+00:00 Debian Importer Fixing VCID-91u7-vh6n-v7fm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:47.938826+00:00 Debian Importer Fixing VCID-4jfa-3r1g-m7h8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:44:02.804203+00:00 Debian Importer Fixing VCID-ehff-j1pz-b7e8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:16:36.369091+00:00 Debian Importer Fixing VCID-7krj-8vat-3ydy https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:09:17.889107+00:00 Debian Importer Fixing VCID-tcmz-a5dq-d7cj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:01:06.430694+00:00 Debian Importer Fixing VCID-pru9-2rza-qycd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:52:20.846618+00:00 Debian Importer Fixing VCID-ese4-47tg-efbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:42.776511+00:00 Debian Importer Fixing VCID-dg2r-uz3a-dug5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:42:32.959809+00:00 Debian Importer Fixing VCID-qn74-neyt-jkg9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:39:14.916324+00:00 Debian Importer Fixing VCID-khfr-kgtb-rfam https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:36.817422+00:00 Debian Importer Fixing VCID-rhwb-4vyp-8kf2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:56:09.608630+00:00 Debian Importer Fixing VCID-drp9-bvkd-4kaq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:14.019094+00:00 Debian Importer Fixing VCID-699n-tvdd-qkgj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:40:04.817443+00:00 Debian Importer Fixing VCID-ge2x-rh2r-kqb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:25.342375+00:00 Debian Importer Fixing VCID-hj5r-jms3-x3fe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:28:58.011532+00:00 Debian Importer Fixing VCID-xhtj-rr3y-puc7 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:23:54.801589+00:00 Debian Importer Fixing VCID-wg13-h6gt-r7h5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:20:27.816520+00:00 Debian Importer Fixing VCID-ffpe-1ctd-77e9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:40.037419+00:00 Debian Importer Fixing VCID-b9ks-detx-nkdw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:58.871116+00:00 Debian Importer Fixing VCID-35pg-v3ae-8kct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:43:42.834897+00:00 Debian Importer Fixing VCID-a38m-yzz2-qfcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:33.985415+00:00 Debian Importer Fixing VCID-nbar-1p1f-bqfk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:33:35.433492+00:00 Debian Importer Fixing VCID-w2tb-2uvg-g7hv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:23.038075+00:00 Debian Importer Fixing VCID-27q1-umct-1qe3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:08:33.433862+00:00 Debian Importer Fixing VCID-pz6f-mahv-hue8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:58:07.212805+00:00 Debian Importer Fixing VCID-91u7-vh6n-v7fm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:12.638069+00:00 Debian Importer Fixing VCID-4jfa-3r1g-m7h8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:04.981516+00:00 Debian Importer Fixing VCID-ehff-j1pz-b7e8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:18:35.264472+00:00 Debian Importer Fixing VCID-7krj-8vat-3ydy https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:01.272249+00:00 Debian Importer Fixing VCID-tcmz-a5dq-d7cj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:17:22.139274+00:00 Debian Importer Fixing VCID-pru9-2rza-qycd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:37.590173+00:00 Debian Importer Fixing VCID-ese4-47tg-efbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:21.020170+00:00 Debian Importer Fixing VCID-dg2r-uz3a-dug5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:54.465754+00:00 Debian Importer Fixing VCID-qn74-neyt-jkg9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:38.471098+00:00 Debian Importer Fixing VCID-khfr-kgtb-rfam https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:28.852809+00:00 Debian Importer Fixing VCID-rhwb-4vyp-8kf2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:17.045263+00:00 Debian Importer Fixing VCID-drp9-bvkd-4kaq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:12:02.651749+00:00 Debian Importer Fixing VCID-699n-tvdd-qkgj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:57.128143+00:00 Debian Importer Fixing VCID-ge2x-rh2r-kqb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:24.348882+00:00 Debian Importer Fixing VCID-hj5r-jms3-x3fe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:10:08.966321+00:00 Debian Importer Fixing VCID-xhtj-rr3y-puc7 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:50.058565+00:00 Debian Importer Fixing VCID-wg13-h6gt-r7h5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:37.461479+00:00 Debian Importer Fixing VCID-ffpe-1ctd-77e9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:08:19.297407+00:00 Debian Importer Fixing VCID-b9ks-detx-nkdw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:07:05.362418+00:00 Debian Importer Fixing VCID-35pg-v3ae-8kct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:46.942710+00:00 Debian Importer Fixing VCID-a38m-yzz2-qfcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:18.332200+00:00 Debian Importer Fixing VCID-nbar-1p1f-bqfk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:06:01.313972+00:00 Debian Importer Fixing VCID-w2tb-2uvg-g7hv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:18.900817+00:00 Debian Importer Fixing VCID-27q1-umct-1qe3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:06.347100+00:00 Debian Importer Fixing VCID-pz6f-mahv-hue8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:03:05.141387+00:00 Debian Importer Fixing VCID-91u7-vh6n-v7fm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:37.682793+00:00 Debian Importer Fixing VCID-4jfa-3r1g-m7h8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:32.466418+00:00 Debian Importer Fixing VCID-ehff-j1pz-b7e8 https://security-tracker.debian.org/tracker/data/json 38.1.0