{"url":"http://public2.vulnerablecode.io/api/packages/87912?format=json","purl":"pkg:rpm/redhat/mod_md@1:2.4.0-3.el9_0?arch=1","type":"rpm","namespace":"redhat","name":"mod_md","version":"1:2.4.0-3.el9_0","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3868?format=json","vulnerability_id":"VCID-td8g-tmny-jyaa","summary":"An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.\n\nThis issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.\n\n\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55753.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55753.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-55753","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13976","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22106","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22156","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28352","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28399","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28356","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2831","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28035","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28147","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27956","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-55753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926","reference_id":"1121926","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121926"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419140","reference_id":"2419140","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419140"},{"reference_url":"https://httpd.apache.org/security/json/CVE-2025-55753.json","reference_id":"CVE-2025-55753","reference_type":"","scores":[],"url":"https://httpd.apache.org/security/json/CVE-2025-55753.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23732","reference_id":"RHSA-2025:23732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23738","reference_id":"RHSA-2025:23738","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23738"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23739","reference_id":"RHSA-2025:23739","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0009","reference_id":"RHSA-2026:0009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0010","reference_id":"RHSA-2026:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0011","reference_id":"RHSA-2026:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0012","reference_id":"RHSA-2026:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0029","reference_id":"RHSA-2026:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0030","reference_id":"RHSA-2026:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0092","reference_id":"RHSA-2026:0092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0093","reference_id":"RHSA-2026:0093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0094","reference_id":"RHSA-2026:0094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0094"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2994","reference_id":"RHSA-2026:2994","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2994"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2995","reference_id":"RHSA-2026:2995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2995"},{"reference_url":"https://usn.ubuntu.com/7968-1/","reference_id":"USN-7968-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7968-1/"}],"fixed_packages":[],"aliases":["CVE-2025-55753"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-td8g-tmny-jyaa"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mod_md@1:2.4.0-3.el9_0%3Farch=1"}