Search for packages
| purl | pkg:rpm/redhat/httpd@2.2.3-11.el5_1?arch=3 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 9.6 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-115r-fep2-fyfm
Aliases: CVE-2007-6422 |
A flaw was found in the mod_proxy_balancer module. On sites where mod_proxy_balancer is enabled, an authorized user could send a carefully crafted request that would cause the Apache child process handling that request to crash. This could lead to a denial of service if using a threaded Multi-Processing Module. | There are no reported fixed by versions. |
|
VCID-2261-sdn2-zbbu
Aliases: CVE-2007-6421 |
A flaw was found in the mod_proxy_balancer module. On sites where mod_proxy_balancer is enabled, a cross-site scripting attack against an authorized user is possible. | There are no reported fixed by versions. |
|
VCID-dqkp-f1my-dbg9
Aliases: CVE-2007-5000 |
A flaw was found in the mod_imagemap module. On sites where mod_imagemap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible. | There are no reported fixed by versions. |
|
VCID-jvhf-ecm7-fbb8
Aliases: CVE-2007-4465 |
Multiple vulnerabilities have been discovered in Apache, possibly resulting in a Denial of Service or the disclosure of sensitive information. | There are no reported fixed by versions. |
|
VCID-kgpj-aexq-7kah
Aliases: CVE-2007-6388 |
A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. | There are no reported fixed by versions. |
|
VCID-ss79-kcpu-mqd5
Aliases: CVE-2008-0005 |
A workaround was added in the mod_proxy_ftp module. On sites where mod_proxy_ftp is enabled and a forward proxy is configured, a cross-site scripting attack is possible against Web browsers which do not correctly derive the response character set following the rules in RFC 2616. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||