Search for packages
purl | pkg:apache/httpd@1.3.41 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-ncrq-j3f7-aaag
Aliases: CVE-2010-0010 |
CVE-2010-0010 rhn-apache: buffer overflow via integer overflow vulnerability on 64bit platforms |
Affected by 1 other vulnerability. Affected by 0 other vulnerabilities. |
VCID-wyfa-5v5x-aaam
Aliases: CVE-2011-3368 |
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-ftdm-put6-aaaf | Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
CVE-2007-5000
|
VCID-kjcr-z95a-aaae | Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
CVE-2007-6388
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T12:34:43.337635+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 36.0.0 |
2025-03-28T12:34:40.668688+00:00 | Apache HTTPD Importer | Affected by | VCID-ncrq-j3f7-aaag | https://httpd.apache.org/security/json/CVE-2010-0010.json | 36.0.0 |
2025-03-28T12:34:36.350641+00:00 | Apache HTTPD Importer | Fixing | VCID-kjcr-z95a-aaae | https://httpd.apache.org/security/json/CVE-2007-6388.json | 36.0.0 |
2025-03-28T12:34:35.581953+00:00 | Apache HTTPD Importer | Fixing | VCID-ftdm-put6-aaaf | https://httpd.apache.org/security/json/CVE-2007-5000.json | 36.0.0 |
2024-11-18T22:52:39.359028+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 34.3.2 |
2024-11-18T22:52:34.482363+00:00 | Apache HTTPD Importer | Affected by | VCID-ncrq-j3f7-aaag | https://httpd.apache.org/security/json/CVE-2010-0010.json | 34.3.2 |
2024-11-18T22:52:25.984021+00:00 | Apache HTTPD Importer | Fixing | VCID-kjcr-z95a-aaae | https://httpd.apache.org/security/json/CVE-2007-6388.json | 34.3.2 |
2024-11-18T22:52:24.829206+00:00 | Apache HTTPD Importer | Fixing | VCID-ftdm-put6-aaaf | https://httpd.apache.org/security/json/CVE-2007-5000.json | 34.3.2 |
2024-01-04T01:33:30.357303+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 34.0.0rc1 |
2024-01-04T01:33:27.778166+00:00 | Apache HTTPD Importer | Affected by | VCID-ncrq-j3f7-aaag | https://httpd.apache.org/security/json/CVE-2010-0010.json | 34.0.0rc1 |
2024-01-04T01:33:23.605337+00:00 | Apache HTTPD Importer | Fixing | VCID-kjcr-z95a-aaae | https://httpd.apache.org/security/json/CVE-2007-6388.json | 34.0.0rc1 |
2024-01-04T01:33:22.888766+00:00 | Apache HTTPD Importer | Fixing | VCID-ftdm-put6-aaaf | https://httpd.apache.org/security/json/CVE-2007-5000.json | 34.0.0rc1 |