Search for packages
purl | pkg:apache/httpd@2.2.22 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1awx-fb64-aaae
Aliases: CVE-2017-3167 |
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 34 other vulnerabilities. |
VCID-1pf4-rzru-aaak
Aliases: CVE-2015-3183 |
The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 8 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 30 other vulnerabilities. |
VCID-2cgf-57ed-aaap
Aliases: CVE-2017-9798 |
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 31 other vulnerabilities. |
VCID-5zd4-jd9e-aaac
Aliases: CVE-2014-0098 |
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation. |
Affected by 13 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 41 other vulnerabilities. |
VCID-9w5c-q5bk-aaae
Aliases: CVE-2012-4558 |
Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string. |
Affected by 15 other vulnerabilities. Affected by 40 other vulnerabilities. |
VCID-dmwk-usu8-aaas
Aliases: CVE-2013-6438 |
The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request. |
Affected by 13 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 41 other vulnerabilities. |
VCID-evyq-x542-aaaj
Aliases: CVE-2014-0226 |
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c. |
Affected by 0 other vulnerabilities. Affected by 9 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 37 other vulnerabilities. |
VCID-g5wc-xh9z-aaaf
Aliases: CVE-2017-7679 |
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 34 other vulnerabilities. |
VCID-g7gd-zfmv-aaae
Aliases: CVE-2016-4975 |
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31). |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 6 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 38 other vulnerabilities. |
VCID-hvbx-3ykq-aaan
Aliases: CVE-2013-1862 |
mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. |
Affected by 15 other vulnerabilities. Affected by 15 other vulnerabilities. |
VCID-kraa-vyt2-aaaa
Aliases: CVE-2017-9788 |
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 32 other vulnerabilities. |
VCID-n958-rf3k-aaan
Aliases: CVE-2012-2687 |
Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list. |
Affected by 19 other vulnerabilities. Affected by 42 other vulnerabilities. |
VCID-pm2k-zdhx-aaam
Aliases: CVE-2017-3169 |
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 34 other vulnerabilities. |
VCID-q1pj-pmht-aaam
Aliases: CVE-2013-1896 |
mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI. |
Affected by 15 other vulnerabilities. Affected by 15 other vulnerabilities. Affected by 1 other vulnerability. Affected by 42 other vulnerabilities. |
VCID-ryex-1mb4-aaap
Aliases: CVE-2016-5387 |
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 6 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 38 other vulnerabilities. |
VCID-sh71-kuxa-aaag
Aliases: CVE-2012-0883 |
envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl. |
Affected by 19 other vulnerabilities. Affected by 44 other vulnerabilities. |
VCID-tnc6-bvst-aaan
Aliases: CVE-2013-5704 |
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such." |
Affected by 0 other vulnerabilities. Affected by 9 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 34 other vulnerabilities. |
VCID-wf8u-9fv3-aaap
Aliases: CVE-2016-8743 |
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 6 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 38 other vulnerabilities. |
VCID-wmsx-921j-aaam
Aliases: CVE-2012-3499 |
Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules. |
Affected by 15 other vulnerabilities. Affected by 40 other vulnerabilities. |
VCID-xjt7-2ew4-aaaj
Aliases: CVE-2014-0118 |
The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size. |
Affected by 0 other vulnerabilities. Affected by 9 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 37 other vulnerabilities. |
VCID-xqb8-4zzf-aaae
Aliases: CVE-2014-0231 |
The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor. |
Affected by 0 other vulnerabilities. Affected by 9 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 37 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-5rut-tj2x-aaap | The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368. |
CVE-2011-4317
|
VCID-aafu-m6st-aaaq | The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request. |
CVE-2012-4557
|
VCID-cxt1-n6br-aaaf | protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. |
CVE-2012-0053
|
VCID-gjk7-z8g3-aaaq | Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. |
CVE-2011-3607
|
VCID-js2f-s8sz-aaan | The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value. |
CVE-2012-0021
|
VCID-wyfa-5v5x-aaam | The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. |
CVE-2011-3368
|
VCID-y8n2-ru9b-aaac | scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function. |
CVE-2012-0031
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T12:34:53.341245+00:00 | Apache HTTPD Importer | Affected by | VCID-2cgf-57ed-aaap | https://httpd.apache.org/security/json/CVE-2017-9798.json | 36.0.0 |
2025-03-28T12:34:52.874990+00:00 | Apache HTTPD Importer | Affected by | VCID-kraa-vyt2-aaaa | https://httpd.apache.org/security/json/CVE-2017-9788.json | 36.0.0 |
2025-03-28T12:34:52.439666+00:00 | Apache HTTPD Importer | Affected by | VCID-g5wc-xh9z-aaaf | https://httpd.apache.org/security/json/CVE-2017-7679.json | 36.0.0 |
2025-03-28T12:34:51.940710+00:00 | Apache HTTPD Importer | Affected by | VCID-pm2k-zdhx-aaam | https://httpd.apache.org/security/json/CVE-2017-3169.json | 36.0.0 |
2025-03-28T12:34:51.505454+00:00 | Apache HTTPD Importer | Affected by | VCID-1awx-fb64-aaae | https://httpd.apache.org/security/json/CVE-2017-3167.json | 36.0.0 |
2025-03-28T12:34:51.085649+00:00 | Apache HTTPD Importer | Affected by | VCID-wf8u-9fv3-aaap | https://httpd.apache.org/security/json/CVE-2016-8743.json | 36.0.0 |
2025-03-28T12:34:50.634318+00:00 | Apache HTTPD Importer | Affected by | VCID-ryex-1mb4-aaap | https://httpd.apache.org/security/json/CVE-2016-5387.json | 36.0.0 |
2025-03-28T12:34:50.192684+00:00 | Apache HTTPD Importer | Affected by | VCID-g7gd-zfmv-aaae | https://httpd.apache.org/security/json/CVE-2016-4975.json | 36.0.0 |
2025-03-28T12:34:49.563267+00:00 | Apache HTTPD Importer | Affected by | VCID-1pf4-rzru-aaak | https://httpd.apache.org/security/json/CVE-2015-3183.json | 36.0.0 |
2025-03-28T12:34:48.993933+00:00 | Apache HTTPD Importer | Affected by | VCID-xqb8-4zzf-aaae | https://httpd.apache.org/security/json/CVE-2014-0231.json | 36.0.0 |
2025-03-28T12:34:48.661145+00:00 | Apache HTTPD Importer | Affected by | VCID-evyq-x542-aaaj | https://httpd.apache.org/security/json/CVE-2014-0226.json | 36.0.0 |
2025-03-28T12:34:48.327982+00:00 | Apache HTTPD Importer | Affected by | VCID-xjt7-2ew4-aaaj | https://httpd.apache.org/security/json/CVE-2014-0118.json | 36.0.0 |
2025-03-28T12:34:47.982986+00:00 | Apache HTTPD Importer | Affected by | VCID-5zd4-jd9e-aaac | https://httpd.apache.org/security/json/CVE-2014-0098.json | 36.0.0 |
2025-03-28T12:34:47.669137+00:00 | Apache HTTPD Importer | Affected by | VCID-dmwk-usu8-aaas | https://httpd.apache.org/security/json/CVE-2013-6438.json | 36.0.0 |
2025-03-28T12:34:47.327022+00:00 | Apache HTTPD Importer | Affected by | VCID-tnc6-bvst-aaan | https://httpd.apache.org/security/json/CVE-2013-5704.json | 36.0.0 |
2025-03-28T12:34:47.003220+00:00 | Apache HTTPD Importer | Affected by | VCID-q1pj-pmht-aaam | https://httpd.apache.org/security/json/CVE-2013-1896.json | 36.0.0 |
2025-03-28T12:34:46.669473+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 36.0.0 |
2025-03-28T12:34:46.287297+00:00 | Apache HTTPD Importer | Affected by | VCID-9w5c-q5bk-aaae | https://httpd.apache.org/security/json/CVE-2012-4558.json | 36.0.0 |
2025-03-28T12:34:46.169383+00:00 | Apache HTTPD Importer | Fixing | VCID-aafu-m6st-aaaq | https://httpd.apache.org/security/json/CVE-2012-4557.json | 36.0.0 |
2025-03-28T12:34:45.937876+00:00 | Apache HTTPD Importer | Affected by | VCID-wmsx-921j-aaam | https://httpd.apache.org/security/json/CVE-2012-3499.json | 36.0.0 |
2025-03-28T12:34:45.696490+00:00 | Apache HTTPD Importer | Affected by | VCID-n958-rf3k-aaan | https://httpd.apache.org/security/json/CVE-2012-2687.json | 36.0.0 |
2025-03-28T12:34:45.463149+00:00 | Apache HTTPD Importer | Affected by | VCID-sh71-kuxa-aaag | https://httpd.apache.org/security/json/CVE-2012-0883.json | 36.0.0 |
2025-03-28T12:34:45.342248+00:00 | Apache HTTPD Importer | Fixing | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 36.0.0 |
2025-03-28T12:34:44.903978+00:00 | Apache HTTPD Importer | Fixing | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 36.0.0 |
2025-03-28T12:34:44.469821+00:00 | Apache HTTPD Importer | Fixing | VCID-js2f-s8sz-aaan | https://httpd.apache.org/security/json/CVE-2012-0021.json | 36.0.0 |
2025-03-28T12:34:44.428656+00:00 | Apache HTTPD Importer | Fixing | VCID-5rut-tj2x-aaap | https://httpd.apache.org/security/json/CVE-2011-4317.json | 36.0.0 |
2025-03-28T12:34:44.310414+00:00 | Apache HTTPD Importer | Fixing | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 36.0.0 |
2025-03-28T12:34:43.871445+00:00 | Apache HTTPD Importer | Fixing | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 36.0.0 |
2024-11-18T22:52:58.484793+00:00 | Apache HTTPD Importer | Affected by | VCID-2cgf-57ed-aaap | https://httpd.apache.org/security/json/CVE-2017-9798.json | 34.3.2 |
2024-11-18T22:52:57.610280+00:00 | Apache HTTPD Importer | Affected by | VCID-kraa-vyt2-aaaa | https://httpd.apache.org/security/json/CVE-2017-9788.json | 34.3.2 |
2024-11-18T22:52:56.912687+00:00 | Apache HTTPD Importer | Affected by | VCID-g5wc-xh9z-aaaf | https://httpd.apache.org/security/json/CVE-2017-7679.json | 34.3.2 |
2024-11-18T22:52:55.760679+00:00 | Apache HTTPD Importer | Affected by | VCID-pm2k-zdhx-aaam | https://httpd.apache.org/security/json/CVE-2017-3169.json | 34.3.2 |
2024-11-18T22:52:55.075872+00:00 | Apache HTTPD Importer | Affected by | VCID-1awx-fb64-aaae | https://httpd.apache.org/security/json/CVE-2017-3167.json | 34.3.2 |
2024-11-18T22:52:54.414875+00:00 | Apache HTTPD Importer | Affected by | VCID-wf8u-9fv3-aaap | https://httpd.apache.org/security/json/CVE-2016-8743.json | 34.3.2 |
2024-11-18T22:52:53.593320+00:00 | Apache HTTPD Importer | Affected by | VCID-ryex-1mb4-aaap | https://httpd.apache.org/security/json/CVE-2016-5387.json | 34.3.2 |
2024-11-18T22:52:52.782004+00:00 | Apache HTTPD Importer | Affected by | VCID-g7gd-zfmv-aaae | https://httpd.apache.org/security/json/CVE-2016-4975.json | 34.3.2 |
2024-11-18T22:52:51.383881+00:00 | Apache HTTPD Importer | Affected by | VCID-1pf4-rzru-aaak | https://httpd.apache.org/security/json/CVE-2015-3183.json | 34.3.2 |
2024-11-18T22:52:49.755736+00:00 | Apache HTTPD Importer | Affected by | VCID-xqb8-4zzf-aaae | https://httpd.apache.org/security/json/CVE-2014-0231.json | 34.3.2 |
2024-11-18T22:52:49.177358+00:00 | Apache HTTPD Importer | Affected by | VCID-evyq-x542-aaaj | https://httpd.apache.org/security/json/CVE-2014-0226.json | 34.3.2 |
2024-11-18T22:52:48.601836+00:00 | Apache HTTPD Importer | Affected by | VCID-xjt7-2ew4-aaaj | https://httpd.apache.org/security/json/CVE-2014-0118.json | 34.3.2 |
2024-11-18T22:52:47.871898+00:00 | Apache HTTPD Importer | Affected by | VCID-5zd4-jd9e-aaac | https://httpd.apache.org/security/json/CVE-2014-0098.json | 34.3.2 |
2024-11-18T22:52:47.312119+00:00 | Apache HTTPD Importer | Affected by | VCID-dmwk-usu8-aaas | https://httpd.apache.org/security/json/CVE-2013-6438.json | 34.3.2 |
2024-11-18T22:52:46.725790+00:00 | Apache HTTPD Importer | Affected by | VCID-tnc6-bvst-aaan | https://httpd.apache.org/security/json/CVE-2013-5704.json | 34.3.2 |
2024-11-18T22:52:45.876742+00:00 | Apache HTTPD Importer | Affected by | VCID-q1pj-pmht-aaam | https://httpd.apache.org/security/json/CVE-2013-1896.json | 34.3.2 |
2024-11-18T22:52:45.281664+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 34.3.2 |
2024-11-18T22:52:44.641691+00:00 | Apache HTTPD Importer | Affected by | VCID-9w5c-q5bk-aaae | https://httpd.apache.org/security/json/CVE-2012-4558.json | 34.3.2 |
2024-11-18T22:52:44.391615+00:00 | Apache HTTPD Importer | Fixing | VCID-aafu-m6st-aaaq | https://httpd.apache.org/security/json/CVE-2012-4557.json | 34.3.2 |
2024-11-18T22:52:43.764512+00:00 | Apache HTTPD Importer | Affected by | VCID-wmsx-921j-aaam | https://httpd.apache.org/security/json/CVE-2012-3499.json | 34.3.2 |
2024-11-18T22:52:43.252260+00:00 | Apache HTTPD Importer | Affected by | VCID-n958-rf3k-aaan | https://httpd.apache.org/security/json/CVE-2012-2687.json | 34.3.2 |
2024-11-18T22:52:42.736816+00:00 | Apache HTTPD Importer | Affected by | VCID-sh71-kuxa-aaag | https://httpd.apache.org/security/json/CVE-2012-0883.json | 34.3.2 |
2024-11-18T22:52:42.488549+00:00 | Apache HTTPD Importer | Fixing | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 34.3.2 |
2024-11-18T22:52:41.799902+00:00 | Apache HTTPD Importer | Fixing | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 34.3.2 |
2024-11-18T22:52:41.108646+00:00 | Apache HTTPD Importer | Fixing | VCID-js2f-s8sz-aaan | https://httpd.apache.org/security/json/CVE-2012-0021.json | 34.3.2 |
2024-11-18T22:52:40.931256+00:00 | Apache HTTPD Importer | Fixing | VCID-5rut-tj2x-aaap | https://httpd.apache.org/security/json/CVE-2011-4317.json | 34.3.2 |
2024-11-18T22:52:40.682177+00:00 | Apache HTTPD Importer | Fixing | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 34.3.2 |
2024-11-18T22:52:40.006558+00:00 | Apache HTTPD Importer | Fixing | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 34.3.2 |
2024-01-04T01:33:40.143807+00:00 | Apache HTTPD Importer | Affected by | VCID-2cgf-57ed-aaap | https://httpd.apache.org/security/json/CVE-2017-9798.json | 34.0.0rc1 |
2024-01-04T01:33:39.694738+00:00 | Apache HTTPD Importer | Affected by | VCID-kraa-vyt2-aaaa | https://httpd.apache.org/security/json/CVE-2017-9788.json | 34.0.0rc1 |
2024-01-04T01:33:39.276682+00:00 | Apache HTTPD Importer | Affected by | VCID-g5wc-xh9z-aaaf | https://httpd.apache.org/security/json/CVE-2017-7679.json | 34.0.0rc1 |
2024-01-04T01:33:38.788758+00:00 | Apache HTTPD Importer | Affected by | VCID-pm2k-zdhx-aaam | https://httpd.apache.org/security/json/CVE-2017-3169.json | 34.0.0rc1 |
2024-01-04T01:33:38.373686+00:00 | Apache HTTPD Importer | Affected by | VCID-1awx-fb64-aaae | https://httpd.apache.org/security/json/CVE-2017-3167.json | 34.0.0rc1 |
2024-01-04T01:33:37.976315+00:00 | Apache HTTPD Importer | Affected by | VCID-wf8u-9fv3-aaap | https://httpd.apache.org/security/json/CVE-2016-8743.json | 34.0.0rc1 |
2024-01-04T01:33:37.533679+00:00 | Apache HTTPD Importer | Affected by | VCID-ryex-1mb4-aaap | https://httpd.apache.org/security/json/CVE-2016-5387.json | 34.0.0rc1 |
2024-01-04T01:33:37.103619+00:00 | Apache HTTPD Importer | Affected by | VCID-g7gd-zfmv-aaae | https://httpd.apache.org/security/json/CVE-2016-4975.json | 34.0.0rc1 |
2024-01-04T01:33:36.473455+00:00 | Apache HTTPD Importer | Affected by | VCID-1pf4-rzru-aaak | https://httpd.apache.org/security/json/CVE-2015-3183.json | 34.0.0rc1 |
2024-01-04T01:33:35.896627+00:00 | Apache HTTPD Importer | Affected by | VCID-xqb8-4zzf-aaae | https://httpd.apache.org/security/json/CVE-2014-0231.json | 34.0.0rc1 |
2024-01-04T01:33:35.576752+00:00 | Apache HTTPD Importer | Affected by | VCID-evyq-x542-aaaj | https://httpd.apache.org/security/json/CVE-2014-0226.json | 34.0.0rc1 |
2024-01-04T01:33:35.252187+00:00 | Apache HTTPD Importer | Affected by | VCID-xjt7-2ew4-aaaj | https://httpd.apache.org/security/json/CVE-2014-0118.json | 34.0.0rc1 |
2024-01-04T01:33:34.912442+00:00 | Apache HTTPD Importer | Affected by | VCID-5zd4-jd9e-aaac | https://httpd.apache.org/security/json/CVE-2014-0098.json | 34.0.0rc1 |
2024-01-04T01:33:34.603311+00:00 | Apache HTTPD Importer | Affected by | VCID-dmwk-usu8-aaas | https://httpd.apache.org/security/json/CVE-2013-6438.json | 34.0.0rc1 |
2024-01-04T01:33:34.245942+00:00 | Apache HTTPD Importer | Affected by | VCID-tnc6-bvst-aaan | https://httpd.apache.org/security/json/CVE-2013-5704.json | 34.0.0rc1 |
2024-01-04T01:33:33.916195+00:00 | Apache HTTPD Importer | Affected by | VCID-q1pj-pmht-aaam | https://httpd.apache.org/security/json/CVE-2013-1896.json | 34.0.0rc1 |
2024-01-04T01:33:33.596106+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 34.0.0rc1 |
2024-01-04T01:33:33.223275+00:00 | Apache HTTPD Importer | Affected by | VCID-9w5c-q5bk-aaae | https://httpd.apache.org/security/json/CVE-2012-4558.json | 34.0.0rc1 |
2024-01-04T01:33:33.099314+00:00 | Apache HTTPD Importer | Fixing | VCID-aafu-m6st-aaaq | https://httpd.apache.org/security/json/CVE-2012-4557.json | 34.0.0rc1 |
2024-01-04T01:33:32.874077+00:00 | Apache HTTPD Importer | Affected by | VCID-wmsx-921j-aaam | https://httpd.apache.org/security/json/CVE-2012-3499.json | 34.0.0rc1 |
2024-01-04T01:33:32.642921+00:00 | Apache HTTPD Importer | Affected by | VCID-n958-rf3k-aaan | https://httpd.apache.org/security/json/CVE-2012-2687.json | 34.0.0rc1 |
2024-01-04T01:33:32.420751+00:00 | Apache HTTPD Importer | Affected by | VCID-sh71-kuxa-aaag | https://httpd.apache.org/security/json/CVE-2012-0883.json | 34.0.0rc1 |
2024-01-04T01:33:32.297900+00:00 | Apache HTTPD Importer | Fixing | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 34.0.0rc1 |
2024-01-04T01:33:31.877644+00:00 | Apache HTTPD Importer | Fixing | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 34.0.0rc1 |
2024-01-04T01:33:31.454945+00:00 | Apache HTTPD Importer | Fixing | VCID-js2f-s8sz-aaan | https://httpd.apache.org/security/json/CVE-2012-0021.json | 34.0.0rc1 |
2024-01-04T01:33:31.408518+00:00 | Apache HTTPD Importer | Fixing | VCID-5rut-tj2x-aaap | https://httpd.apache.org/security/json/CVE-2011-4317.json | 34.0.0rc1 |
2024-01-04T01:33:31.289944+00:00 | Apache HTTPD Importer | Fixing | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 34.0.0rc1 |
2024-01-04T01:33:30.870545+00:00 | Apache HTTPD Importer | Fixing | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 34.0.0rc1 |