Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/apache2@2.0.54-5?distro=trixie
purl pkg:deb/debian/apache2@2.0.54-5?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-bfvg-u6sz-6qc6 A flaw occured when using the Apache server as a HTTP proxy. A remote attacker could send a HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, causing Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request. This could allow the bypass of web application firewall protection or lead to cross-site scripting (XSS) attacks. CVE-2005-2088
VCID-d66x-55ub-vkfw An off-by-one stack overflow was discovered in the mod_ssl CRL verification callback. In order to exploit this issue the Apache server would need to be configured to use a malicious certificate revocation list (CRL) CVE-2005-1268
VCID-pufp-t6dh-xqhv A flaw in the mod_ssl handling of the "SSLVerifyClient" directive. This flaw would occur if a virtual host has been configured using "SSLVerifyClient optional" and further a directive "SSLVerifyClient required" is set for a specific location. For servers configured in this fashion, an attacker may be able to access resources that should otherwise be protected, by not supplying a client certificate when connecting. CVE-2005-2700
VCID-vqs2-5x99-7qfd A flaw in the byterange filter would cause some responses to be buffered into memory. If a server has a dynamic resource such as a CGI script or PHP script which generates a large amount of data, an attacker could send carefully crafted requests in order to consume resources, potentially leading to a Denial of Service. CVE-2005-2728

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:01:08.177359+00:00 Debian Importer Fixing VCID-bfvg-u6sz-6qc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:15:15.505214+00:00 Debian Importer Fixing VCID-vqs2-5x99-7qfd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:22:45.690399+00:00 Debian Importer Fixing VCID-pufp-t6dh-xqhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:42.426849+00:00 Debian Importer Fixing VCID-d66x-55ub-vkfw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:56:47.256741+00:00 Debian Importer Fixing VCID-bfvg-u6sz-6qc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:22:53.137749+00:00 Debian Importer Fixing VCID-vqs2-5x99-7qfd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:44:55.075339+00:00 Debian Importer Fixing VCID-pufp-t6dh-xqhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:48.678937+00:00 Debian Importer Fixing VCID-d66x-55ub-vkfw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:16:59.908574+00:00 Debian Importer Fixing VCID-bfvg-u6sz-6qc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:14:14.993062+00:00 Debian Importer Fixing VCID-vqs2-5x99-7qfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:11:23.988271+00:00 Debian Importer Fixing VCID-pufp-t6dh-xqhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:11.268494+00:00 Debian Importer Fixing VCID-d66x-55ub-vkfw https://security-tracker.debian.org/tracker/data/json 38.1.0