Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/httpd@2.0.46-40?arch=ent
Typerpm
Namespaceredhat
Namehttpd
Version2.0.46-40
Qualifiers
arch ent
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-76s2-26cr-syd1
vulnerability_id VCID-76s2-26cr-syd1
summary An issue was discovered in the mod_dav module which could be triggered for a location where WebDAV authoring access has been configured. A malicious remote client which is authorized to use the LOCK method could force an httpd child process to crash by sending a particular sequence of LOCK requests. This issue does not allow execution of arbitrary code. and will only result in a denial of service where a threaded process model is in use.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0809.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0809
reference_id
reference_type
scores
0
value 0.14022
scoring_system epss
scoring_elements 0.94412
published_at 2026-05-14T12:55:00Z
1
value 0.14022
scoring_system epss
scoring_elements 0.94299
published_at 2026-04-01T12:55:00Z
2
value 0.14022
scoring_system epss
scoring_elements 0.94308
published_at 2026-04-02T12:55:00Z
3
value 0.14022
scoring_system epss
scoring_elements 0.9432
published_at 2026-04-04T12:55:00Z
4
value 0.14022
scoring_system epss
scoring_elements 0.94321
published_at 2026-04-07T12:55:00Z
5
value 0.14022
scoring_system epss
scoring_elements 0.9433
published_at 2026-04-08T12:55:00Z
6
value 0.14022
scoring_system epss
scoring_elements 0.94335
published_at 2026-04-09T12:55:00Z
7
value 0.14022
scoring_system epss
scoring_elements 0.94338
published_at 2026-04-12T12:55:00Z
8
value 0.14022
scoring_system epss
scoring_elements 0.9434
published_at 2026-04-13T12:55:00Z
9
value 0.14022
scoring_system epss
scoring_elements 0.94355
published_at 2026-04-16T12:55:00Z
10
value 0.14022
scoring_system epss
scoring_elements 0.9436
published_at 2026-04-29T12:55:00Z
11
value 0.14022
scoring_system epss
scoring_elements 0.94361
published_at 2026-04-21T12:55:00Z
12
value 0.14022
scoring_system epss
scoring_elements 0.94363
published_at 2026-04-24T12:55:00Z
13
value 0.14022
scoring_system epss
scoring_elements 0.94362
published_at 2026-04-26T12:55:00Z
14
value 0.14022
scoring_system epss
scoring_elements 0.94365
published_at 2026-05-05T12:55:00Z
15
value 0.14022
scoring_system epss
scoring_elements 0.94374
published_at 2026-05-07T12:55:00Z
16
value 0.14022
scoring_system epss
scoring_elements 0.94386
published_at 2026-05-09T12:55:00Z
17
value 0.14022
scoring_system epss
scoring_elements 0.94393
published_at 2026-05-11T12:55:00Z
18
value 0.14022
scoring_system epss
scoring_elements 0.94399
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0809
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617299
reference_id 1617299
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617299
4
reference_url https://httpd.apache.org/security/json/CVE-2004-0809.json
reference_id CVE-2004-0809
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0809.json
5
reference_url https://access.redhat.com/errata/RHSA-2004:463
reference_id RHSA-2004:463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:463
fixed_packages
aliases CVE-2004-0809
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76s2-26cr-syd1
1
url VCID-f8n9-ampd-yyah
vulnerability_id VCID-f8n9-ampd-yyah
summary An issue was discovered in the mod_ssl module in Apache 2.0.44-2.0.50 which could be triggered if the server is configured to allow proxying to a remote SSL server. A malicious remote SSL server could force an httpd child process to crash by sending a carefully crafted response header. This issue is not believed to allow execution of arbitrary code and will only result in a denial of service where a threaded process model is in use.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0751.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0751
reference_id
reference_type
scores
0
value 0.47686
scoring_system epss
scoring_elements 0.9774
published_at 2026-05-14T12:55:00Z
1
value 0.47686
scoring_system epss
scoring_elements 0.97684
published_at 2026-04-01T12:55:00Z
2
value 0.47686
scoring_system epss
scoring_elements 0.97691
published_at 2026-04-02T12:55:00Z
3
value 0.47686
scoring_system epss
scoring_elements 0.97692
published_at 2026-04-07T12:55:00Z
4
value 0.47686
scoring_system epss
scoring_elements 0.97697
published_at 2026-04-08T12:55:00Z
5
value 0.47686
scoring_system epss
scoring_elements 0.977
published_at 2026-04-09T12:55:00Z
6
value 0.47686
scoring_system epss
scoring_elements 0.97703
published_at 2026-04-11T12:55:00Z
7
value 0.47686
scoring_system epss
scoring_elements 0.97705
published_at 2026-04-12T12:55:00Z
8
value 0.47686
scoring_system epss
scoring_elements 0.97706
published_at 2026-04-13T12:55:00Z
9
value 0.47686
scoring_system epss
scoring_elements 0.97712
published_at 2026-04-16T12:55:00Z
10
value 0.47686
scoring_system epss
scoring_elements 0.97716
published_at 2026-04-26T12:55:00Z
11
value 0.47686
scoring_system epss
scoring_elements 0.97715
published_at 2026-04-24T12:55:00Z
12
value 0.47686
scoring_system epss
scoring_elements 0.97722
published_at 2026-04-29T12:55:00Z
13
value 0.47686
scoring_system epss
scoring_elements 0.97724
published_at 2026-05-05T12:55:00Z
14
value 0.47686
scoring_system epss
scoring_elements 0.97726
published_at 2026-05-07T12:55:00Z
15
value 0.47686
scoring_system epss
scoring_elements 0.97728
published_at 2026-05-11T12:55:00Z
16
value 0.47686
scoring_system epss
scoring_elements 0.97732
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0751
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617264
reference_id 1617264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617264
4
reference_url https://httpd.apache.org/security/json/CVE-2004-0751.json
reference_id CVE-2004-0751
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0751.json
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24590.txt
reference_id CVE-2004-0751;OSVDB-9742
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24590.txt
6
reference_url https://www.securityfocus.com/bid/11154/info
reference_id CVE-2004-0751;OSVDB-9742
reference_type exploit
scores
url https://www.securityfocus.com/bid/11154/info
7
reference_url https://access.redhat.com/errata/RHSA-2004:463
reference_id RHSA-2004:463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:463
fixed_packages
aliases CVE-2004-0751
risk_score 4.2
exploitability 2.0
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8n9-ampd-yyah
2
url VCID-fq9j-uewn-q7h7
vulnerability_id VCID-fq9j-uewn-q7h7
summary A buffer overflow was found in the expansion of environment variables during configuration file parsing. This issue could allow a local user to gain the privileges of a httpd child if a server can be forced to parse a carefully crafted .htaccess file written by a local user.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0747.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0747
reference_id
reference_type
scores
0
value 0.01437
scoring_system epss
scoring_elements 0.80792
published_at 2026-05-05T12:55:00Z
1
value 0.01437
scoring_system epss
scoring_elements 0.80639
published_at 2026-04-01T12:55:00Z
2
value 0.01437
scoring_system epss
scoring_elements 0.80647
published_at 2026-04-02T12:55:00Z
3
value 0.01437
scoring_system epss
scoring_elements 0.8089
published_at 2026-05-14T12:55:00Z
4
value 0.01437
scoring_system epss
scoring_elements 0.80848
published_at 2026-05-12T12:55:00Z
5
value 0.01437
scoring_system epss
scoring_elements 0.80829
published_at 2026-05-11T12:55:00Z
6
value 0.01437
scoring_system epss
scoring_elements 0.80835
published_at 2026-05-09T12:55:00Z
7
value 0.01437
scoring_system epss
scoring_elements 0.80814
published_at 2026-05-07T12:55:00Z
8
value 0.01437
scoring_system epss
scoring_elements 0.80775
published_at 2026-04-29T12:55:00Z
9
value 0.01437
scoring_system epss
scoring_elements 0.80762
published_at 2026-04-26T12:55:00Z
10
value 0.01437
scoring_system epss
scoring_elements 0.80758
published_at 2026-04-24T12:55:00Z
11
value 0.01437
scoring_system epss
scoring_elements 0.80735
published_at 2026-04-21T12:55:00Z
12
value 0.01437
scoring_system epss
scoring_elements 0.80732
published_at 2026-04-18T12:55:00Z
13
value 0.01437
scoring_system epss
scoring_elements 0.80731
published_at 2026-04-16T12:55:00Z
14
value 0.01437
scoring_system epss
scoring_elements 0.80697
published_at 2026-04-13T12:55:00Z
15
value 0.01437
scoring_system epss
scoring_elements 0.80705
published_at 2026-04-12T12:55:00Z
16
value 0.01437
scoring_system epss
scoring_elements 0.80719
published_at 2026-04-11T12:55:00Z
17
value 0.01437
scoring_system epss
scoring_elements 0.80702
published_at 2026-04-09T12:55:00Z
18
value 0.01437
scoring_system epss
scoring_elements 0.80692
published_at 2026-04-08T12:55:00Z
19
value 0.01437
scoring_system epss
scoring_elements 0.80664
published_at 2026-04-07T12:55:00Z
20
value 0.01437
scoring_system epss
scoring_elements 0.80669
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747
3
reference_url http://www.trustix.org/errata/2004/0047/
reference_id 0047
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.trustix.org/errata/2004/0047/
4
reference_url http://www.vupen.com/english/advisories/2009/1233
reference_id 1233
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.vupen.com/english/advisories/2009/1233
5
reference_url http://secunia.com/advisories/12540
reference_id 12540
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://secunia.com/advisories/12540
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617261
reference_id 1617261
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617261
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17384
reference_id 17384
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17384
8
reference_url http://www.novell.com/linux/security/advisories/2004_32_apache2.html
reference_id 2004_32_apache2.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.novell.com/linux/security/advisories/2004_32_apache2.html
9
reference_url http://secunia.com/advisories/34920
reference_id 34920
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://secunia.com/advisories/34920
10
reference_url http://www.kb.cert.org/vuls/id/481998
reference_id 481998
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.kb.cert.org/vuls/id/481998
11
reference_url http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096
reference_id advisory.php?name=MDKSA-2004:096
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096
12
reference_url https://httpd.apache.org/security/json/CVE-2004-0747.json
reference_id CVE-2004-0747
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0747.json
13
reference_url http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml
reference_id glsa-200409-21.xml
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml
14
reference_url http://securitytracker.com/id?1011303
reference_id id?1011303
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://securitytracker.com/id?1011303
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561
reference_id oval%3Aorg.mitre.oval%3Adef%3A11561
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561
16
reference_url http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
reference_id phpsupcontent?contentID=205147
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
17
reference_url https://access.redhat.com/errata/RHSA-2004:463
reference_id RHSA-2004:463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:463
18
reference_url http://www.redhat.com/support/errata/RHSA-2004-463.html
reference_id RHSA-2004-463.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-05T21:31:51Z/
url http://www.redhat.com/support/errata/RHSA-2004-463.html
fixed_packages
aliases CVE-2004-0747
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fq9j-uewn-q7h7
3
url VCID-g1jc-8vza-u3ad
vulnerability_id VCID-g1jc-8vza-u3ad
summary Testing using the Codenomicon HTTP Test Tool performed by the Apache Software Foundation security group and Red Hat uncovered an input validation issue in the IPv6 URI parsing routines in the apr-util library. If a remote attacker sent a request including a carefully crafted URI, an httpd child process could be made to crash. One some BSD systems it is believed this flaw may be able to lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0786.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0786
reference_id
reference_type
scores
0
value 0.48362
scoring_system epss
scoring_elements 0.97775
published_at 2026-05-14T12:55:00Z
1
value 0.48362
scoring_system epss
scoring_elements 0.97719
published_at 2026-04-01T12:55:00Z
2
value 0.48362
scoring_system epss
scoring_elements 0.97726
published_at 2026-04-02T12:55:00Z
3
value 0.48362
scoring_system epss
scoring_elements 0.97728
published_at 2026-04-07T12:55:00Z
4
value 0.48362
scoring_system epss
scoring_elements 0.97733
published_at 2026-04-08T12:55:00Z
5
value 0.48362
scoring_system epss
scoring_elements 0.97736
published_at 2026-04-09T12:55:00Z
6
value 0.48362
scoring_system epss
scoring_elements 0.97739
published_at 2026-04-11T12:55:00Z
7
value 0.48362
scoring_system epss
scoring_elements 0.97741
published_at 2026-04-12T12:55:00Z
8
value 0.48362
scoring_system epss
scoring_elements 0.97742
published_at 2026-04-13T12:55:00Z
9
value 0.48362
scoring_system epss
scoring_elements 0.97748
published_at 2026-04-16T12:55:00Z
10
value 0.48362
scoring_system epss
scoring_elements 0.97751
published_at 2026-04-18T12:55:00Z
11
value 0.48362
scoring_system epss
scoring_elements 0.9775
published_at 2026-04-26T12:55:00Z
12
value 0.48362
scoring_system epss
scoring_elements 0.97757
published_at 2026-04-29T12:55:00Z
13
value 0.48362
scoring_system epss
scoring_elements 0.9776
published_at 2026-05-05T12:55:00Z
14
value 0.48362
scoring_system epss
scoring_elements 0.97762
published_at 2026-05-07T12:55:00Z
15
value 0.48362
scoring_system epss
scoring_elements 0.97763
published_at 2026-05-11T12:55:00Z
16
value 0.48362
scoring_system epss
scoring_elements 0.97767
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0786
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0786
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617289
reference_id 1617289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617289
4
reference_url https://httpd.apache.org/security/json/CVE-2004-0786.json
reference_id CVE-2004-0786
reference_type
scores
0
value critical
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2004-0786.json
5
reference_url https://access.redhat.com/errata/RHSA-2004:463
reference_id RHSA-2004:463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:463
fixed_packages
aliases CVE-2004-0786
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g1jc-8vza-u3ad
Fixing_vulnerabilities
Risk_score4.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd@2.0.46-40%3Farch=ent