Search for packages
purl | pkg:apache/httpd@2.0.37 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1a68-fd5t-aaam
Aliases: CVE-2005-2970 |
Memory leak in the worker MPM (worker.c) for Apache 2, in certain circumstances, allows remote attackers to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-1euj-bdhz-aaas
Aliases: CVE-2004-0174 |
Apache 1.4.x before 1.3.30, and 2.0.x before 2.0.49, when using multiple listening sockets on certain platforms, allows remote attackers to cause a denial of service (blocked new connections) via a "short-lived connection on a rarely-accessed listening socket." |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 44 other vulnerabilities. |
VCID-29gg-v4hb-aaak
Aliases: CVE-2011-3192 |
The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-2x6x-awvc-aaab
Aliases: CVE-2002-0840 |
Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote attackers to execute script as other web page visitors via the Host: header, a different vulnerability than CAN-2002-1157. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 55 other vulnerabilities. |
VCID-44gh-afxy-aaad
Aliases: CVE-2007-3304 |
Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer." |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 22 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 54 other vulnerabilities. Affected by 54 other vulnerabilities. |
VCID-6dqj-e12w-aaag
Aliases: CVE-2004-0113 |
Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 44 other vulnerabilities. |
VCID-7avr-h3vb-aaap
Aliases: CVE-2005-2491 |
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-7epu-t4dd-aaak
Aliases: CVE-2004-0786 |
The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 39 other vulnerabilities. |
VCID-8dyd-depr-aaam
Aliases: CVE-2009-3560 |
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 31 other vulnerabilities. |
VCID-8ukk-t776-aaap
Aliases: CVE-2005-2088 |
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling." |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-9ct1-1kcj-aaaa
Aliases: CVE-2003-0542 |
Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 46 other vulnerabilities. |
VCID-a61m-1sk9-aaaj
Aliases: CVE-2010-0434 |
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 35 other vulnerabilities. |
VCID-atse-ehnv-aaam
Aliases: CVE-2004-0942 |
Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 35 other vulnerabilities. |
VCID-c7e7-cdc7-aaam
Aliases: CVE-2009-3720 |
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 31 other vulnerabilities. |
VCID-cxt1-n6br-aaaf
Aliases: CVE-2012-0053 |
protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
VCID-dq5v-7ymd-aaaq
Aliases: CVE-2009-3095 |
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 38 other vulnerabilities. |
VCID-e6x1-gmf5-aaak
Aliases: CVE-2003-0254 |
Apache 2 before 2.0.47, when running on an IPv6 host, allows attackers to cause a denial of service (CPU consumption by infinite loop) when the FTP proxy server fails to create an IPv6 socket. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 48 other vulnerabilities. |
VCID-em8a-nphs-aaac
Aliases: CVE-2003-0245 |
Vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library for Apache 2.0.37 through 2.0.45 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-ftdm-put6-aaaf
Aliases: CVE-2007-5000 |
Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 49 other vulnerabilities. |
VCID-fvyj-4dnq-aaae
Aliases: CVE-2004-0885 |
The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 35 other vulnerabilities. |
VCID-g44d-hskq-aaap
Aliases: CVE-2005-1268 |
Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-gjk7-z8g3-aaaq
Aliases: CVE-2011-3607 |
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
VCID-gpje-mbp8-aaas
Aliases: CVE-2005-2700 |
ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-h6ud-vwcc-aaac
Aliases: CVE-2005-2728 |
The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-hvbx-3ykq-aaan
Aliases: CVE-2013-1862 |
mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 15 other vulnerabilities. Affected by 15 other vulnerabilities. |
VCID-j1rr-k9yr-aaae
Aliases: CVE-2008-2364 |
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 49 other vulnerabilities. |
VCID-kc1n-kjf5-aaah
Aliases: CVE-2003-0789 |
mod_cgid in Apache before 2.0.48, when using a threaded MPM, does not properly handle CGI redirect paths, which could cause Apache to send the output of a CGI program to the wrong client. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 46 other vulnerabilities. |
VCID-kjcr-z95a-aaae
Aliases: CVE-2007-6388 |
Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 49 other vulnerabilities. |
VCID-m4ax-6zsp-aaas
Aliases: CVE-2003-0020 |
Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 44 other vulnerabilities. |
VCID-m62j-uyy8-aaak
Aliases: CVE-2003-0132 |
A memory leak in Apache 2.0 through 2.0.44 allows remote attackers to cause a denial of service (memory consumption) via large chunks of linefeed characters, which causes Apache to allocate 80 bytes for each linefeed. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 54 other vulnerabilities. |
VCID-nm2g-nz56-aaas
Aliases: CVE-2006-5752 |
Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 22 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 54 other vulnerabilities. Affected by 54 other vulnerabilities. |
VCID-p4wk-zcuh-aaad
Aliases: CVE-2009-1891 |
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption). |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 42 other vulnerabilities. |
VCID-pwtu-8hzx-aaak
Aliases: CVE-2008-0005 |
mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 49 other vulnerabilities. |
VCID-qczm-195h-aaaa
Aliases: CVE-2004-1834 |
mod_disk_cache in Apache 2.0 through 2.0.49 stores client headers, including authentication information, on the hard disk, which could allow local users to gain sensitive information. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 35 other vulnerabilities. |
VCID-qg9k-gsfp-aaad
Aliases: CVE-2003-0253 |
The prefork MPM in Apache 2 before 2.0.47 does not properly handle certain errors from accept, which could lead to a denial of service. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 48 other vulnerabilities. |
VCID-qhh5-wcj1-aaae
Aliases: CVE-2008-2939 |
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 47 other vulnerabilities. |
VCID-qnd2-28dh-aaab
Aliases: CVE-2004-0488 |
Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 43 other vulnerabilities. |
VCID-qpz8-ys7s-aaam
Aliases: CVE-2005-3352 |
Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 27 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 59 other vulnerabilities. |
VCID-rxf1-1k5a-aaam
Aliases: CVE-2010-1623 |
Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 31 other vulnerabilities. |
VCID-sw39-2am9-aaas
Aliases: CVE-2004-0809 |
The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 39 other vulnerabilities. |
VCID-t9hu-6b2h-aaae
Aliases: CVE-2010-1452 |
The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 33 other vulnerabilities. |
VCID-tkhp-xxex-aaag
Aliases: CVE-2007-3847 |
The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 22 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 54 other vulnerabilities. Affected by 54 other vulnerabilities. |
VCID-us96-4dyu-aaad
Aliases: CVE-2009-2412 |
Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 41 other vulnerabilities. |
VCID-w5ba-fmfs-aaam
Aliases: CVE-2011-0419 |
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 30 other vulnerabilities. |
VCID-wvxf-fms8-aaae
Aliases: CVE-2002-0661 |
Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters. |
Affected by 0 other vulnerabilities. Affected by 55 other vulnerabilities. |
VCID-wyfa-5v5x-aaam
Aliases: CVE-2011-3368 |
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
VCID-xfau-vqn8-aaah
Aliases: CVE-2010-0425 |
modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers." |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 35 other vulnerabilities. |
VCID-xhcz-k5b7-aaak
Aliases: CVE-2002-1593 |
mod_dav in Apache before 2.0.42 does not properly handle versioning hooks, which may allow remote attackers to kill a child process via a null dereference and cause a denial of service (CPU consumption) in a preforked multi-processing module. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 55 other vulnerabilities. |
VCID-y6c7-dj1n-aaas
Aliases: CVE-2007-1863 |
cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 22 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 54 other vulnerabilities. Affected by 54 other vulnerabilities. |
VCID-y8n2-ru9b-aaac
Aliases: CVE-2012-0031 |
scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
VCID-y8ne-1k27-aaam
Aliases: CVE-2005-3357 |
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 27 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 59 other vulnerabilities. |
VCID-z2dp-keth-aaan
Aliases: CVE-2009-3094 |
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 38 other vulnerabilities. |
VCID-zrpf-ny12-aaak
Aliases: CVE-2003-0083 |
Apache 1.3 before 1.3.25 and Apache 2.0 before version 2.0.46 does not filter terminal escape sequences from its access logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences, a different vulnerability than CVE-2003-0020. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 51 other vulnerabilities. |
VCID-zsjm-dz9u-aaah
Aliases: CVE-2003-0192 |
Apache 2 before 2.0.47, and certain versions of mod_ssl for Apache 1.3, do not properly handle "certain sequences of per-directory renegotiations and the SSLCipherSuite directive being used to upgrade from a weak ciphersuite to a strong one," which could cause Apache to use the weak ciphersuite. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 48 other vulnerabilities. |
VCID-zzbw-4xp9-aaaj
Aliases: CVE-2004-0747 |
Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 39 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-jz2v-4k62-aaac | Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size. |
CVE-2002-0392
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T12:34:46.461261+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 36.0.0 |
2025-03-28T12:34:44.939544+00:00 | Apache HTTPD Importer | Affected by | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 36.0.0 |
2025-03-28T12:34:44.501018+00:00 | Apache HTTPD Importer | Affected by | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 36.0.0 |
2025-03-28T12:34:43.907896+00:00 | Apache HTTPD Importer | Affected by | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 36.0.0 |
2025-03-28T12:34:43.357453+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 36.0.0 |
2025-03-28T12:34:42.740477+00:00 | Apache HTTPD Importer | Affected by | VCID-29gg-v4hb-aaak | https://httpd.apache.org/security/json/CVE-2011-3192.json | 36.0.0 |
2025-03-28T12:34:42.330228+00:00 | Apache HTTPD Importer | Affected by | VCID-w5ba-fmfs-aaam | https://httpd.apache.org/security/json/CVE-2011-0419.json | 36.0.0 |
2025-03-28T12:34:41.868178+00:00 | Apache HTTPD Importer | Affected by | VCID-rxf1-1k5a-aaam | https://httpd.apache.org/security/json/CVE-2010-1623.json | 36.0.0 |
2025-03-28T12:34:41.496785+00:00 | Apache HTTPD Importer | Affected by | VCID-t9hu-6b2h-aaae | https://httpd.apache.org/security/json/CVE-2010-1452.json | 36.0.0 |
2025-03-28T12:34:41.132793+00:00 | Apache HTTPD Importer | Affected by | VCID-a61m-1sk9-aaaj | https://httpd.apache.org/security/json/CVE-2010-0434.json | 36.0.0 |
2025-03-28T12:34:40.777522+00:00 | Apache HTTPD Importer | Affected by | VCID-xfau-vqn8-aaah | https://httpd.apache.org/security/json/CVE-2010-0425.json | 36.0.0 |
2025-03-28T12:34:40.171856+00:00 | Apache HTTPD Importer | Affected by | VCID-c7e7-cdc7-aaam | https://httpd.apache.org/security/json/CVE-2009-3720.json | 36.0.0 |
2025-03-28T12:34:39.792291+00:00 | Apache HTTPD Importer | Affected by | VCID-8dyd-depr-aaam | https://httpd.apache.org/security/json/CVE-2009-3560.json | 36.0.0 |
2025-03-28T12:34:39.439260+00:00 | Apache HTTPD Importer | Affected by | VCID-dq5v-7ymd-aaaq | https://httpd.apache.org/security/json/CVE-2009-3095.json | 36.0.0 |
2025-03-28T12:34:39.086990+00:00 | Apache HTTPD Importer | Affected by | VCID-z2dp-keth-aaan | https://httpd.apache.org/security/json/CVE-2009-3094.json | 36.0.0 |
2025-03-28T12:34:38.654777+00:00 | Apache HTTPD Importer | Affected by | VCID-us96-4dyu-aaad | https://httpd.apache.org/security/json/CVE-2009-2412.json | 36.0.0 |
2025-03-28T12:34:38.183100+00:00 | Apache HTTPD Importer | Affected by | VCID-p4wk-zcuh-aaad | https://httpd.apache.org/security/json/CVE-2009-1891.json | 36.0.0 |
2025-03-28T12:34:37.647815+00:00 | Apache HTTPD Importer | Affected by | VCID-qhh5-wcj1-aaae | https://httpd.apache.org/security/json/CVE-2008-2939.json | 36.0.0 |
2025-03-28T12:34:37.340450+00:00 | Apache HTTPD Importer | Affected by | VCID-j1rr-k9yr-aaae | https://httpd.apache.org/security/json/CVE-2008-2364.json | 36.0.0 |
2025-03-28T12:34:36.986136+00:00 | Apache HTTPD Importer | Affected by | VCID-pwtu-8hzx-aaak | https://httpd.apache.org/security/json/CVE-2008-0005.json | 36.0.0 |
2025-03-28T12:34:36.222207+00:00 | Apache HTTPD Importer | Affected by | VCID-kjcr-z95a-aaae | https://httpd.apache.org/security/json/CVE-2007-6388.json | 36.0.0 |
2025-03-28T12:34:35.452571+00:00 | Apache HTTPD Importer | Affected by | VCID-ftdm-put6-aaaf | https://httpd.apache.org/security/json/CVE-2007-5000.json | 36.0.0 |
2025-03-28T12:34:35.056224+00:00 | Apache HTTPD Importer | Affected by | VCID-tkhp-xxex-aaag | https://httpd.apache.org/security/json/CVE-2007-3847.json | 36.0.0 |
2025-03-28T12:34:34.464357+00:00 | Apache HTTPD Importer | Affected by | VCID-44gh-afxy-aaad | https://httpd.apache.org/security/json/CVE-2007-3304.json | 36.0.0 |
2025-03-28T12:34:34.082458+00:00 | Apache HTTPD Importer | Affected by | VCID-y6c7-dj1n-aaas | https://httpd.apache.org/security/json/CVE-2007-1863.json | 36.0.0 |
2025-03-28T12:34:33.488401+00:00 | Apache HTTPD Importer | Affected by | VCID-nm2g-nz56-aaas | https://httpd.apache.org/security/json/CVE-2006-5752.json | 36.0.0 |
2025-03-28T12:34:32.685204+00:00 | Apache HTTPD Importer | Affected by | VCID-y8ne-1k27-aaam | https://httpd.apache.org/security/json/CVE-2005-3357.json | 36.0.0 |
2025-03-28T12:34:32.188325+00:00 | Apache HTTPD Importer | Affected by | VCID-qpz8-ys7s-aaam | https://httpd.apache.org/security/json/CVE-2005-3352.json | 36.0.0 |
2025-03-28T12:34:31.961828+00:00 | Apache HTTPD Importer | Affected by | VCID-1a68-fd5t-aaam | https://httpd.apache.org/security/json/CVE-2005-2970.json | 36.0.0 |
2025-03-28T12:34:31.859310+00:00 | Apache HTTPD Importer | Affected by | VCID-h6ud-vwcc-aaac | https://httpd.apache.org/security/json/CVE-2005-2728.json | 36.0.0 |
2025-03-28T12:34:31.752359+00:00 | Apache HTTPD Importer | Affected by | VCID-gpje-mbp8-aaas | https://httpd.apache.org/security/json/CVE-2005-2700.json | 36.0.0 |
2025-03-28T12:34:31.644809+00:00 | Apache HTTPD Importer | Affected by | VCID-7avr-h3vb-aaap | https://httpd.apache.org/security/json/CVE-2005-2491.json | 36.0.0 |
2025-03-28T12:34:31.534881+00:00 | Apache HTTPD Importer | Affected by | VCID-8ukk-t776-aaap | https://httpd.apache.org/security/json/CVE-2005-2088.json | 36.0.0 |
2025-03-28T12:34:31.426003+00:00 | Apache HTTPD Importer | Affected by | VCID-g44d-hskq-aaap | https://httpd.apache.org/security/json/CVE-2005-1268.json | 36.0.0 |
2025-03-28T12:34:31.328920+00:00 | Apache HTTPD Importer | Affected by | VCID-qczm-195h-aaaa | https://httpd.apache.org/security/json/CVE-2004-1834.json | 36.0.0 |
2025-03-28T12:34:31.232239+00:00 | Apache HTTPD Importer | Affected by | VCID-atse-ehnv-aaam | https://httpd.apache.org/security/json/CVE-2004-0942.json | 36.0.0 |
2025-03-28T12:34:31.006796+00:00 | Apache HTTPD Importer | Affected by | VCID-fvyj-4dnq-aaae | https://httpd.apache.org/security/json/CVE-2004-0885.json | 36.0.0 |
2025-03-28T12:34:30.900347+00:00 | Apache HTTPD Importer | Affected by | VCID-sw39-2am9-aaas | https://httpd.apache.org/security/json/CVE-2004-0809.json | 36.0.0 |
2025-03-28T12:34:30.813775+00:00 | Apache HTTPD Importer | Affected by | VCID-7epu-t4dd-aaak | https://httpd.apache.org/security/json/CVE-2004-0786.json | 36.0.0 |
2025-03-28T12:34:30.657184+00:00 | Apache HTTPD Importer | Affected by | VCID-zzbw-4xp9-aaaj | https://httpd.apache.org/security/json/CVE-2004-0747.json | 36.0.0 |
2025-03-28T12:34:30.514705+00:00 | Apache HTTPD Importer | Affected by | VCID-qnd2-28dh-aaab | https://httpd.apache.org/security/json/CVE-2004-0488.json | 36.0.0 |
2025-03-28T12:34:30.372330+00:00 | Apache HTTPD Importer | Affected by | VCID-1euj-bdhz-aaas | https://httpd.apache.org/security/json/CVE-2004-0174.json | 36.0.0 |
2025-03-28T12:34:30.290736+00:00 | Apache HTTPD Importer | Affected by | VCID-6dqj-e12w-aaag | https://httpd.apache.org/security/json/CVE-2004-0113.json | 36.0.0 |
2025-03-28T12:34:29.996354+00:00 | Apache HTTPD Importer | Affected by | VCID-kc1n-kjf5-aaah | https://httpd.apache.org/security/json/CVE-2003-0789.json | 36.0.0 |
2025-03-28T12:34:29.792110+00:00 | Apache HTTPD Importer | Affected by | VCID-9ct1-1kcj-aaaa | https://httpd.apache.org/security/json/CVE-2003-0542.json | 36.0.0 |
2025-03-28T12:34:29.616011+00:00 | Apache HTTPD Importer | Affected by | VCID-e6x1-gmf5-aaak | https://httpd.apache.org/security/json/CVE-2003-0254.json | 36.0.0 |
2025-03-28T12:34:29.550306+00:00 | Apache HTTPD Importer | Affected by | VCID-qg9k-gsfp-aaad | https://httpd.apache.org/security/json/CVE-2003-0253.json | 36.0.0 |
2025-03-28T12:34:29.489873+00:00 | Apache HTTPD Importer | Affected by | VCID-em8a-nphs-aaac | https://httpd.apache.org/security/json/CVE-2003-0245.json | 36.0.0 |
2025-03-28T12:34:29.434423+00:00 | Apache HTTPD Importer | Affected by | VCID-zsjm-dz9u-aaah | https://httpd.apache.org/security/json/CVE-2003-0192.json | 36.0.0 |
2025-03-28T12:34:29.320044+00:00 | Apache HTTPD Importer | Affected by | VCID-m62j-uyy8-aaak | https://httpd.apache.org/security/json/CVE-2003-0132.json | 36.0.0 |
2025-03-28T12:34:29.147628+00:00 | Apache HTTPD Importer | Affected by | VCID-zrpf-ny12-aaak | https://httpd.apache.org/security/json/CVE-2003-0083.json | 36.0.0 |
2025-03-28T12:34:28.851050+00:00 | Apache HTTPD Importer | Affected by | VCID-m4ax-6zsp-aaas | https://httpd.apache.org/security/json/CVE-2003-0020.json | 36.0.0 |
2025-03-28T12:34:28.672732+00:00 | Apache HTTPD Importer | Affected by | VCID-xhcz-k5b7-aaak | https://httpd.apache.org/security/json/CVE-2002-1593.json | 36.0.0 |
2025-03-28T12:34:28.385708+00:00 | Apache HTTPD Importer | Affected by | VCID-2x6x-awvc-aaab | https://httpd.apache.org/security/json/CVE-2002-0840.json | 36.0.0 |
2025-03-28T12:34:28.172903+00:00 | Apache HTTPD Importer | Affected by | VCID-wvxf-fms8-aaae | https://httpd.apache.org/security/json/CVE-2002-0661.json | 36.0.0 |
2025-03-28T12:34:28.125719+00:00 | Apache HTTPD Importer | Fixing | VCID-jz2v-4k62-aaac | https://httpd.apache.org/security/json/CVE-2002-0392.json | 36.0.0 |
2024-11-18T22:52:45.079986+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 34.3.2 |
2024-11-18T22:52:41.964887+00:00 | Apache HTTPD Importer | Affected by | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 34.3.2 |
2024-11-18T22:52:41.277351+00:00 | Apache HTTPD Importer | Affected by | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 34.3.2 |
2024-11-18T22:52:40.174696+00:00 | Apache HTTPD Importer | Affected by | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 34.3.2 |
2024-11-18T22:52:39.378397+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 34.3.2 |
2024-11-18T22:52:38.364602+00:00 | Apache HTTPD Importer | Affected by | VCID-29gg-v4hb-aaak | https://httpd.apache.org/security/json/CVE-2011-3192.json | 34.3.2 |
2024-11-18T22:52:37.711496+00:00 | Apache HTTPD Importer | Affected by | VCID-w5ba-fmfs-aaam | https://httpd.apache.org/security/json/CVE-2011-0419.json | 34.3.2 |
2024-11-18T22:52:36.715326+00:00 | Apache HTTPD Importer | Affected by | VCID-rxf1-1k5a-aaam | https://httpd.apache.org/security/json/CVE-2010-1623.json | 34.3.2 |
2024-11-18T22:52:36.088977+00:00 | Apache HTTPD Importer | Affected by | VCID-t9hu-6b2h-aaae | https://httpd.apache.org/security/json/CVE-2010-1452.json | 34.3.2 |
2024-11-18T22:52:35.473385+00:00 | Apache HTTPD Importer | Affected by | VCID-a61m-1sk9-aaaj | https://httpd.apache.org/security/json/CVE-2010-0434.json | 34.3.2 |
2024-11-18T22:52:34.862528+00:00 | Apache HTTPD Importer | Affected by | VCID-xfau-vqn8-aaah | https://httpd.apache.org/security/json/CVE-2010-0425.json | 34.3.2 |
2024-11-18T22:52:33.752650+00:00 | Apache HTTPD Importer | Affected by | VCID-c7e7-cdc7-aaam | https://httpd.apache.org/security/json/CVE-2009-3720.json | 34.3.2 |
2024-11-18T22:52:33.125460+00:00 | Apache HTTPD Importer | Affected by | VCID-8dyd-depr-aaam | https://httpd.apache.org/security/json/CVE-2009-3560.json | 34.3.2 |
2024-11-18T22:52:32.512733+00:00 | Apache HTTPD Importer | Affected by | VCID-dq5v-7ymd-aaaq | https://httpd.apache.org/security/json/CVE-2009-3095.json | 34.3.2 |
2024-11-18T22:52:31.899356+00:00 | Apache HTTPD Importer | Affected by | VCID-z2dp-keth-aaan | https://httpd.apache.org/security/json/CVE-2009-3094.json | 34.3.2 |
2024-11-18T22:52:31.077047+00:00 | Apache HTTPD Importer | Affected by | VCID-us96-4dyu-aaad | https://httpd.apache.org/security/json/CVE-2009-2412.json | 34.3.2 |
2024-11-18T22:52:30.056356+00:00 | Apache HTTPD Importer | Affected by | VCID-p4wk-zcuh-aaad | https://httpd.apache.org/security/json/CVE-2009-1891.json | 34.3.2 |
2024-11-18T22:52:28.713464+00:00 | Apache HTTPD Importer | Affected by | VCID-qhh5-wcj1-aaae | https://httpd.apache.org/security/json/CVE-2008-2939.json | 34.3.2 |
2024-11-18T22:52:28.158511+00:00 | Apache HTTPD Importer | Affected by | VCID-j1rr-k9yr-aaae | https://httpd.apache.org/security/json/CVE-2008-2364.json | 34.3.2 |
2024-11-18T22:52:27.408702+00:00 | Apache HTTPD Importer | Affected by | VCID-pwtu-8hzx-aaak | https://httpd.apache.org/security/json/CVE-2008-0005.json | 34.3.2 |
2024-11-18T22:52:25.859063+00:00 | Apache HTTPD Importer | Affected by | VCID-kjcr-z95a-aaae | https://httpd.apache.org/security/json/CVE-2007-6388.json | 34.3.2 |
2024-11-18T22:52:24.702776+00:00 | Apache HTTPD Importer | Affected by | VCID-ftdm-put6-aaaf | https://httpd.apache.org/security/json/CVE-2007-5000.json | 34.3.2 |
2024-11-18T22:52:24.020653+00:00 | Apache HTTPD Importer | Affected by | VCID-tkhp-xxex-aaag | https://httpd.apache.org/security/json/CVE-2007-3847.json | 34.3.2 |
2024-11-18T22:52:23.026444+00:00 | Apache HTTPD Importer | Affected by | VCID-44gh-afxy-aaad | https://httpd.apache.org/security/json/CVE-2007-3304.json | 34.3.2 |
2024-11-18T22:52:22.364601+00:00 | Apache HTTPD Importer | Affected by | VCID-y6c7-dj1n-aaas | https://httpd.apache.org/security/json/CVE-2007-1863.json | 34.3.2 |
2024-09-18T07:21:09.791067+00:00 | Apache HTTPD Importer | Affected by | VCID-nm2g-nz56-aaas | https://httpd.apache.org/security/json/CVE-2006-5752.json | 34.0.1 |
2024-09-18T07:21:09.025578+00:00 | Apache HTTPD Importer | Affected by | VCID-y8ne-1k27-aaam | https://httpd.apache.org/security/json/CVE-2005-3357.json | 34.0.1 |
2024-09-18T07:21:08.505562+00:00 | Apache HTTPD Importer | Affected by | VCID-qpz8-ys7s-aaam | https://httpd.apache.org/security/json/CVE-2005-3352.json | 34.0.1 |
2024-09-18T07:21:08.283221+00:00 | Apache HTTPD Importer | Affected by | VCID-1a68-fd5t-aaam | https://httpd.apache.org/security/json/CVE-2005-2970.json | 34.0.1 |
2024-09-18T07:21:08.183185+00:00 | Apache HTTPD Importer | Affected by | VCID-h6ud-vwcc-aaac | https://httpd.apache.org/security/json/CVE-2005-2728.json | 34.0.1 |
2024-09-18T07:21:08.075776+00:00 | Apache HTTPD Importer | Affected by | VCID-gpje-mbp8-aaas | https://httpd.apache.org/security/json/CVE-2005-2700.json | 34.0.1 |
2024-09-18T07:21:07.964186+00:00 | Apache HTTPD Importer | Affected by | VCID-7avr-h3vb-aaap | https://httpd.apache.org/security/json/CVE-2005-2491.json | 34.0.1 |
2024-09-18T07:21:07.853384+00:00 | Apache HTTPD Importer | Affected by | VCID-8ukk-t776-aaap | https://httpd.apache.org/security/json/CVE-2005-2088.json | 34.0.1 |
2024-09-18T07:21:07.732871+00:00 | Apache HTTPD Importer | Affected by | VCID-g44d-hskq-aaap | https://httpd.apache.org/security/json/CVE-2005-1268.json | 34.0.1 |
2024-09-18T07:21:07.628443+00:00 | Apache HTTPD Importer | Affected by | VCID-qczm-195h-aaaa | https://httpd.apache.org/security/json/CVE-2004-1834.json | 34.0.1 |
2024-09-18T07:21:07.524718+00:00 | Apache HTTPD Importer | Affected by | VCID-atse-ehnv-aaam | https://httpd.apache.org/security/json/CVE-2004-0942.json | 34.0.1 |
2024-09-18T07:21:07.295215+00:00 | Apache HTTPD Importer | Affected by | VCID-fvyj-4dnq-aaae | https://httpd.apache.org/security/json/CVE-2004-0885.json | 34.0.1 |
2024-09-18T07:21:07.180715+00:00 | Apache HTTPD Importer | Affected by | VCID-sw39-2am9-aaas | https://httpd.apache.org/security/json/CVE-2004-0809.json | 34.0.1 |
2024-09-18T07:21:07.088250+00:00 | Apache HTTPD Importer | Affected by | VCID-7epu-t4dd-aaak | https://httpd.apache.org/security/json/CVE-2004-0786.json | 34.0.1 |
2024-09-18T07:21:06.926211+00:00 | Apache HTTPD Importer | Affected by | VCID-zzbw-4xp9-aaaj | https://httpd.apache.org/security/json/CVE-2004-0747.json | 34.0.1 |
2024-09-18T07:21:06.769513+00:00 | Apache HTTPD Importer | Affected by | VCID-qnd2-28dh-aaab | https://httpd.apache.org/security/json/CVE-2004-0488.json | 34.0.1 |
2024-09-18T07:21:06.644026+00:00 | Apache HTTPD Importer | Affected by | VCID-1euj-bdhz-aaas | https://httpd.apache.org/security/json/CVE-2004-0174.json | 34.0.1 |
2024-09-18T07:21:06.560400+00:00 | Apache HTTPD Importer | Affected by | VCID-6dqj-e12w-aaag | https://httpd.apache.org/security/json/CVE-2004-0113.json | 34.0.1 |
2024-09-18T07:21:06.242596+00:00 | Apache HTTPD Importer | Affected by | VCID-kc1n-kjf5-aaah | https://httpd.apache.org/security/json/CVE-2003-0789.json | 34.0.1 |
2024-09-18T07:21:06.039520+00:00 | Apache HTTPD Importer | Affected by | VCID-9ct1-1kcj-aaaa | https://httpd.apache.org/security/json/CVE-2003-0542.json | 34.0.1 |
2024-09-18T07:21:05.862248+00:00 | Apache HTTPD Importer | Affected by | VCID-e6x1-gmf5-aaak | https://httpd.apache.org/security/json/CVE-2003-0254.json | 34.0.1 |
2024-09-18T07:21:05.802082+00:00 | Apache HTTPD Importer | Affected by | VCID-qg9k-gsfp-aaad | https://httpd.apache.org/security/json/CVE-2003-0253.json | 34.0.1 |
2024-09-18T07:21:05.743238+00:00 | Apache HTTPD Importer | Affected by | VCID-em8a-nphs-aaac | https://httpd.apache.org/security/json/CVE-2003-0245.json | 34.0.1 |
2024-09-18T07:21:05.688355+00:00 | Apache HTTPD Importer | Affected by | VCID-zsjm-dz9u-aaah | https://httpd.apache.org/security/json/CVE-2003-0192.json | 34.0.1 |
2024-09-18T07:21:05.568211+00:00 | Apache HTTPD Importer | Affected by | VCID-m62j-uyy8-aaak | https://httpd.apache.org/security/json/CVE-2003-0132.json | 34.0.1 |
2024-09-18T07:21:05.398109+00:00 | Apache HTTPD Importer | Affected by | VCID-zrpf-ny12-aaak | https://httpd.apache.org/security/json/CVE-2003-0083.json | 34.0.1 |
2024-09-18T07:21:05.108326+00:00 | Apache HTTPD Importer | Affected by | VCID-m4ax-6zsp-aaas | https://httpd.apache.org/security/json/CVE-2003-0020.json | 34.0.1 |
2024-09-18T07:21:04.919315+00:00 | Apache HTTPD Importer | Affected by | VCID-xhcz-k5b7-aaak | https://httpd.apache.org/security/json/CVE-2002-1593.json | 34.0.1 |
2024-09-18T07:21:04.624998+00:00 | Apache HTTPD Importer | Affected by | VCID-2x6x-awvc-aaab | https://httpd.apache.org/security/json/CVE-2002-0840.json | 34.0.1 |
2024-09-18T07:21:04.401835+00:00 | Apache HTTPD Importer | Affected by | VCID-wvxf-fms8-aaae | https://httpd.apache.org/security/json/CVE-2002-0661.json | 34.0.1 |
2024-09-18T07:21:04.348615+00:00 | Apache HTTPD Importer | Fixing | VCID-jz2v-4k62-aaac | https://httpd.apache.org/security/json/CVE-2002-0392.json | 34.0.1 |
2024-01-04T01:33:33.398087+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 34.0.0rc1 |
2024-01-04T01:33:31.912567+00:00 | Apache HTTPD Importer | Affected by | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 34.0.0rc1 |
2024-01-04T01:33:31.488858+00:00 | Apache HTTPD Importer | Affected by | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 34.0.0rc1 |
2024-01-04T01:33:30.907485+00:00 | Apache HTTPD Importer | Affected by | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 34.0.0rc1 |
2024-01-04T01:33:30.376258+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 34.0.0rc1 |
2024-01-04T01:33:29.770406+00:00 | Apache HTTPD Importer | Affected by | VCID-29gg-v4hb-aaak | https://httpd.apache.org/security/json/CVE-2011-3192.json | 34.0.0rc1 |
2024-01-04T01:33:29.376453+00:00 | Apache HTTPD Importer | Affected by | VCID-w5ba-fmfs-aaam | https://httpd.apache.org/security/json/CVE-2011-0419.json | 34.0.0rc1 |
2024-01-04T01:33:28.931599+00:00 | Apache HTTPD Importer | Affected by | VCID-rxf1-1k5a-aaam | https://httpd.apache.org/security/json/CVE-2010-1623.json | 34.0.0rc1 |
2024-01-04T01:33:28.577556+00:00 | Apache HTTPD Importer | Affected by | VCID-t9hu-6b2h-aaae | https://httpd.apache.org/security/json/CVE-2010-1452.json | 34.0.0rc1 |
2024-01-04T01:33:28.231444+00:00 | Apache HTTPD Importer | Affected by | VCID-a61m-1sk9-aaaj | https://httpd.apache.org/security/json/CVE-2010-0434.json | 34.0.0rc1 |
2024-01-04T01:33:27.891954+00:00 | Apache HTTPD Importer | Affected by | VCID-xfau-vqn8-aaah | https://httpd.apache.org/security/json/CVE-2010-0425.json | 34.0.0rc1 |
2024-01-04T01:33:27.287464+00:00 | Apache HTTPD Importer | Affected by | VCID-c7e7-cdc7-aaam | https://httpd.apache.org/security/json/CVE-2009-3720.json | 34.0.0rc1 |
2024-01-04T01:33:26.921412+00:00 | Apache HTTPD Importer | Affected by | VCID-8dyd-depr-aaam | https://httpd.apache.org/security/json/CVE-2009-3560.json | 34.0.0rc1 |
2024-01-04T01:33:26.580833+00:00 | Apache HTTPD Importer | Affected by | VCID-dq5v-7ymd-aaaq | https://httpd.apache.org/security/json/CVE-2009-3095.json | 34.0.0rc1 |
2024-01-04T01:33:26.241767+00:00 | Apache HTTPD Importer | Affected by | VCID-z2dp-keth-aaan | https://httpd.apache.org/security/json/CVE-2009-3094.json | 34.0.0rc1 |
2024-01-04T01:33:25.831186+00:00 | Apache HTTPD Importer | Affected by | VCID-us96-4dyu-aaad | https://httpd.apache.org/security/json/CVE-2009-2412.json | 34.0.0rc1 |
2024-01-04T01:33:25.375813+00:00 | Apache HTTPD Importer | Affected by | VCID-p4wk-zcuh-aaad | https://httpd.apache.org/security/json/CVE-2009-1891.json | 34.0.0rc1 |
2024-01-04T01:33:24.856598+00:00 | Apache HTTPD Importer | Affected by | VCID-qhh5-wcj1-aaae | https://httpd.apache.org/security/json/CVE-2008-2939.json | 34.0.0rc1 |
2024-01-04T01:33:24.560367+00:00 | Apache HTTPD Importer | Affected by | VCID-j1rr-k9yr-aaae | https://httpd.apache.org/security/json/CVE-2008-2364.json | 34.0.0rc1 |
2024-01-04T01:33:24.215262+00:00 | Apache HTTPD Importer | Affected by | VCID-pwtu-8hzx-aaak | https://httpd.apache.org/security/json/CVE-2008-0005.json | 34.0.0rc1 |
2024-01-04T01:33:23.491124+00:00 | Apache HTTPD Importer | Affected by | VCID-kjcr-z95a-aaae | https://httpd.apache.org/security/json/CVE-2007-6388.json | 34.0.0rc1 |
2024-01-04T01:33:22.766364+00:00 | Apache HTTPD Importer | Affected by | VCID-ftdm-put6-aaaf | https://httpd.apache.org/security/json/CVE-2007-5000.json | 34.0.0rc1 |
2024-01-04T01:33:22.385306+00:00 | Apache HTTPD Importer | Affected by | VCID-tkhp-xxex-aaag | https://httpd.apache.org/security/json/CVE-2007-3847.json | 34.0.0rc1 |
2024-01-04T01:33:21.816312+00:00 | Apache HTTPD Importer | Affected by | VCID-44gh-afxy-aaad | https://httpd.apache.org/security/json/CVE-2007-3304.json | 34.0.0rc1 |
2024-01-04T01:33:21.442219+00:00 | Apache HTTPD Importer | Affected by | VCID-y6c7-dj1n-aaas | https://httpd.apache.org/security/json/CVE-2007-1863.json | 34.0.0rc1 |
2024-01-04T01:33:20.882995+00:00 | Apache HTTPD Importer | Affected by | VCID-nm2g-nz56-aaas | https://httpd.apache.org/security/json/CVE-2006-5752.json | 34.0.0rc1 |
2024-01-04T01:33:20.119945+00:00 | Apache HTTPD Importer | Affected by | VCID-y8ne-1k27-aaam | https://httpd.apache.org/security/json/CVE-2005-3357.json | 34.0.0rc1 |
2024-01-04T01:33:19.643859+00:00 | Apache HTTPD Importer | Affected by | VCID-qpz8-ys7s-aaam | https://httpd.apache.org/security/json/CVE-2005-3352.json | 34.0.0rc1 |
2024-01-04T01:33:19.423965+00:00 | Apache HTTPD Importer | Affected by | VCID-1a68-fd5t-aaam | https://httpd.apache.org/security/json/CVE-2005-2970.json | 34.0.0rc1 |
2024-01-04T01:33:19.325705+00:00 | Apache HTTPD Importer | Affected by | VCID-h6ud-vwcc-aaac | https://httpd.apache.org/security/json/CVE-2005-2728.json | 34.0.0rc1 |
2024-01-04T01:33:19.222853+00:00 | Apache HTTPD Importer | Affected by | VCID-gpje-mbp8-aaas | https://httpd.apache.org/security/json/CVE-2005-2700.json | 34.0.0rc1 |
2024-01-04T01:33:19.120358+00:00 | Apache HTTPD Importer | Affected by | VCID-7avr-h3vb-aaap | https://httpd.apache.org/security/json/CVE-2005-2491.json | 34.0.0rc1 |
2024-01-04T01:33:19.017342+00:00 | Apache HTTPD Importer | Affected by | VCID-8ukk-t776-aaap | https://httpd.apache.org/security/json/CVE-2005-2088.json | 34.0.0rc1 |
2024-01-04T01:33:18.914513+00:00 | Apache HTTPD Importer | Affected by | VCID-g44d-hskq-aaap | https://httpd.apache.org/security/json/CVE-2005-1268.json | 34.0.0rc1 |
2024-01-04T01:33:18.821460+00:00 | Apache HTTPD Importer | Affected by | VCID-qczm-195h-aaaa | https://httpd.apache.org/security/json/CVE-2004-1834.json | 34.0.0rc1 |
2024-01-04T01:33:18.728801+00:00 | Apache HTTPD Importer | Affected by | VCID-atse-ehnv-aaam | https://httpd.apache.org/security/json/CVE-2004-0942.json | 34.0.0rc1 |
2024-01-04T01:33:18.512993+00:00 | Apache HTTPD Importer | Affected by | VCID-fvyj-4dnq-aaae | https://httpd.apache.org/security/json/CVE-2004-0885.json | 34.0.0rc1 |
2024-01-04T01:33:18.402951+00:00 | Apache HTTPD Importer | Affected by | VCID-sw39-2am9-aaas | https://httpd.apache.org/security/json/CVE-2004-0809.json | 34.0.0rc1 |
2024-01-04T01:33:18.318004+00:00 | Apache HTTPD Importer | Affected by | VCID-7epu-t4dd-aaak | https://httpd.apache.org/security/json/CVE-2004-0786.json | 34.0.0rc1 |
2024-01-04T01:33:18.160201+00:00 | Apache HTTPD Importer | Affected by | VCID-zzbw-4xp9-aaaj | https://httpd.apache.org/security/json/CVE-2004-0747.json | 34.0.0rc1 |
2024-01-04T01:33:18.022065+00:00 | Apache HTTPD Importer | Affected by | VCID-qnd2-28dh-aaab | https://httpd.apache.org/security/json/CVE-2004-0488.json | 34.0.0rc1 |
2024-01-04T01:33:17.886890+00:00 | Apache HTTPD Importer | Affected by | VCID-1euj-bdhz-aaas | https://httpd.apache.org/security/json/CVE-2004-0174.json | 34.0.0rc1 |
2024-01-04T01:33:17.808713+00:00 | Apache HTTPD Importer | Affected by | VCID-6dqj-e12w-aaag | https://httpd.apache.org/security/json/CVE-2004-0113.json | 34.0.0rc1 |
2024-01-04T01:33:17.506820+00:00 | Apache HTTPD Importer | Affected by | VCID-kc1n-kjf5-aaah | https://httpd.apache.org/security/json/CVE-2003-0789.json | 34.0.0rc1 |
2024-01-04T01:33:17.291242+00:00 | Apache HTTPD Importer | Affected by | VCID-9ct1-1kcj-aaaa | https://httpd.apache.org/security/json/CVE-2003-0542.json | 34.0.0rc1 |
2024-01-04T01:33:17.105040+00:00 | Apache HTTPD Importer | Affected by | VCID-e6x1-gmf5-aaak | https://httpd.apache.org/security/json/CVE-2003-0254.json | 34.0.0rc1 |
2024-01-04T01:33:17.034835+00:00 | Apache HTTPD Importer | Affected by | VCID-qg9k-gsfp-aaad | https://httpd.apache.org/security/json/CVE-2003-0253.json | 34.0.0rc1 |
2024-01-04T01:33:16.966463+00:00 | Apache HTTPD Importer | Affected by | VCID-em8a-nphs-aaac | https://httpd.apache.org/security/json/CVE-2003-0245.json | 34.0.0rc1 |
2024-01-04T01:33:16.908807+00:00 | Apache HTTPD Importer | Affected by | VCID-zsjm-dz9u-aaah | https://httpd.apache.org/security/json/CVE-2003-0192.json | 34.0.0rc1 |
2024-01-04T01:33:16.786249+00:00 | Apache HTTPD Importer | Affected by | VCID-m62j-uyy8-aaak | https://httpd.apache.org/security/json/CVE-2003-0132.json | 34.0.0rc1 |
2024-01-04T01:33:16.618422+00:00 | Apache HTTPD Importer | Affected by | VCID-zrpf-ny12-aaak | https://httpd.apache.org/security/json/CVE-2003-0083.json | 34.0.0rc1 |
2024-01-04T01:33:16.334196+00:00 | Apache HTTPD Importer | Affected by | VCID-m4ax-6zsp-aaas | https://httpd.apache.org/security/json/CVE-2003-0020.json | 34.0.0rc1 |
2024-01-04T01:33:16.148168+00:00 | Apache HTTPD Importer | Affected by | VCID-xhcz-k5b7-aaak | https://httpd.apache.org/security/json/CVE-2002-1593.json | 34.0.0rc1 |
2024-01-04T01:33:15.863344+00:00 | Apache HTTPD Importer | Affected by | VCID-2x6x-awvc-aaab | https://httpd.apache.org/security/json/CVE-2002-0840.json | 34.0.0rc1 |
2024-01-04T01:33:15.655795+00:00 | Apache HTTPD Importer | Affected by | VCID-wvxf-fms8-aaae | https://httpd.apache.org/security/json/CVE-2002-0661.json | 34.0.0rc1 |
2024-01-04T01:33:15.605199+00:00 | Apache HTTPD Importer | Fixing | VCID-jz2v-4k62-aaac | https://httpd.apache.org/security/json/CVE-2002-0392.json | 34.0.0rc1 |