Search for packages
| purl | pkg:rpm/redhat/apache@1.3.27-12?arch=ent |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 2.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-j3mb-97k1-uuh9
Aliases: CVE-2006-5752 |
A flaw was found in the mod_status module. On sites where the server-status page is publicly accessible and ExtendedStatus is enabled this could lead to a cross-site scripting attack. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. | There are no reported fixed by versions. |
|
VCID-srxw-jjvr-p3d5
Aliases: CVE-2007-3304 |
The Apache HTTP server did not verify that a process was an Apache child process before sending it signals. A local attacker with the ability to run scripts on the HTTP server could manipulate the scoreboard and cause arbitrary processes to be terminated which could lead to a denial of service. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:59:44.771407+00:00 | RedHat Importer | Affected by | VCID-srxw-jjvr-p3d5 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3304.json | 38.0.0 |
| 2026-04-01T14:59:44.037561+00:00 | RedHat Importer | Affected by | VCID-j3mb-97k1-uuh9 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5752.json | 38.0.0 |