Search for packages
| purl | pkg:rpm/redhat/httpd@2.0.46-46.2?arch=ent |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 2.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-bfvg-u6sz-6qc6
Aliases: CVE-2005-2088 |
A flaw occured when using the Apache server as a HTTP proxy. A remote attacker could send a HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, causing Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request. This could allow the bypass of web application firewall protection or lead to cross-site scripting (XSS) attacks. | There are no reported fixed by versions. |
|
VCID-d66x-55ub-vkfw
Aliases: CVE-2005-1268 |
An off-by-one stack overflow was discovered in the mod_ssl CRL verification callback. In order to exploit this issue the Apache server would need to be configured to use a malicious certificate revocation list (CRL) | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T15:00:35.778597+00:00 | RedHat Importer | Affected by | VCID-d66x-55ub-vkfw | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1268.json | 38.0.0 |
| 2026-04-01T15:00:35.706055+00:00 | RedHat Importer | Affected by | VCID-bfvg-u6sz-6qc6 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2088.json | 38.0.0 |