Search for packages
| purl | pkg:apache/httpd@2.0.52 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-17dn-vnzu-eugr
Aliases: CVE-2009-3094 |
A NULL pointer dereference flaw was found in the mod_proxy_ftp module. A malicious FTP server to which requests are being proxied could use this flaw to crash an httpd child process via a malformed reply to the EPSV or PASV commands, resulting in a limited denial of service. |
Affected by 7 other vulnerabilities. Affected by 38 other vulnerabilities. |
|
VCID-1r9x-9cx9-3far
Aliases: CVE-2008-2939 |
A flaw was found in the handling of wildcards in the path of a FTP URL with mod_proxy_ftp. If mod_proxy_ftp is enabled to support FTP-over-HTTP, requests containing globbing characters could lead to cross-site scripting (XSS) attacks. |
Affected by 7 other vulnerabilities. Affected by 47 other vulnerabilities. |
|
VCID-2gy9-knuh-23et
Aliases: CVE-2005-2700 |
A flaw in the mod_ssl handling of the "SSLVerifyClient" directive. This flaw would occur if a virtual host has been configured using "SSLVerifyClient optional" and further a directive "SSLVerifyClient required" is set for a specific location. For servers configured in this fashion, an attacker may be able to access resources that should otherwise be protected, by not supplying a client certificate when connecting. |
Affected by 29 other vulnerabilities. |
|
VCID-2h74-w9ra-wbf7
Aliases: CVE-2009-2412 |
A flaw in apr_palloc() in the bundled copy of APR could cause heap overflows in programs that try to apr_palloc() a user controlled size. The Apache HTTP Server itself does not pass unsanitized user-provided sizes to this function, so it could only be triggered through some other application which uses apr_palloc() in a vulnerable way. |
Affected by 7 other vulnerabilities. Affected by 41 other vulnerabilities. |
|
VCID-39rt-392b-5bey
Aliases: CVE-2011-3192 |
A flaw was found in the way the Apache HTTP Server handled Range HTTP headers. A remote attacker could use this flaw to cause httpd to use an excessive amount of memory and CPU time via HTTP requests with a specially-crafted Range header. This could be used in a denial of service attack. Advisory: CVE-2011-3192.txt |
Affected by 0 other vulnerabilities. Affected by 29 other vulnerabilities. |
|
VCID-68d6-q8af-83b7
Aliases: CVE-2004-0942 |
An issue was discovered where the field length limit was not enforced for certain malicious requests. This could allow a remote attacker who is able to send large amounts of data to a server the ability to cause Apache children to consume proportional amounts of memory, leading to a denial of service. |
Affected by 35 other vulnerabilities. |
|
VCID-6tnh-h3yx-hugn
Aliases: CVE-2004-1834 |
The experimental mod_disk_cache module stored client authentication credentials for cached objects such as proxy authentication credentials and Basic Authentication passwords on disk. |
Affected by 35 other vulnerabilities. |
|
VCID-7f2z-4x67-hqfw
Aliases: CVE-2009-3095 |
A flaw was found in the mod_proxy_ftp module. In a reverse proxy configuration, a remote attacker could use this flaw to bypass intended access restrictions by creating a carefully-crafted HTTP Authorization header, allowing the attacker to send arbitrary commands to the FTP server. |
Affected by 7 other vulnerabilities. Affected by 38 other vulnerabilities. |
|
VCID-7jx2-zgdg-vbbr
Aliases: CVE-2012-0031 |
A flaw was found in the handling of the scoreboard. An unprivileged child process could cause the parent process to crash at shutdown rather than terminate cleanly. |
Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
|
VCID-8adb-pxka-97gq
Aliases: CVE-2011-0419 |
A flaw was found in the apr_fnmatch() function of the bundled APR library. Where mod_autoindex is enabled, and a directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack. Workaround: Setting the 'IgnoreClient' option to the 'IndexOptions' directive disables processing of the client-supplied request query arguments, preventing this attack. Resolution: Update APR to release 1.4.5 (bundled with httpd 2.2.19) or release 0.9.20 (bundled with httpd 2.0.65) |
Affected by 0 other vulnerabilities. Affected by 30 other vulnerabilities. |
|
VCID-8rr4-7xg6-8bfk
Aliases: CVE-2006-5752 |
A flaw was found in the mod_status module. On sites where the server-status page is publicly accessible and ExtendedStatus is enabled this could lead to a cross-site scripting attack. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. |
Affected by 22 other vulnerabilities. Affected by 54 other vulnerabilities. |
|
VCID-a5d5-k9b3-pfbm
Aliases: CVE-2011-3607 |
An integer overflow flaw was found which, when the mod_setenvif module is enabled, could allow local users to gain privileges via a .htaccess file. |
Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
|
VCID-cj89-ap45-jueq
Aliases: CVE-2006-3747 |
An off-by-one flaw exists in the Rewrite module, mod_rewrite. Depending on the manner in which Apache httpd was compiled, this software defect may result in a vulnerability which, in combination with certain types of Rewrite rules in the web server configuration files, could be triggered remotely. For vulnerable builds, the nature of the vulnerability can be denial of service (crashing of web server processes) or potentially allow arbitrary code execution. |
Affected by 26 other vulnerabilities. Affected by 58 other vulnerabilities. |
|
VCID-cjbk-v93c-hyav
Aliases: CVE-2009-3560 |
A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM. |
Affected by 7 other vulnerabilities. Affected by 31 other vulnerabilities. |
|
VCID-cqrd-ejej-uqe9
Aliases: CVE-2010-1623 |
A flaw was found in the apr_brigade_split_line() function of the bundled APR-util library, used to process non-SSL requests. A remote attacker could send requests, carefully crafting the timing of individual bytes, which would slowly consume memory, potentially leading to a denial of service. |
Affected by 7 other vulnerabilities. Affected by 31 other vulnerabilities. |
|
VCID-ddmx-yewy-n7hd
Aliases: CVE-2005-2970 |
A memory leak in the worker MPM would allow remote attackers to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections. This issue was downgraded in severity to low (from moderate) as sucessful exploitation of the race condition would be difficult. |
Affected by 29 other vulnerabilities. |
|
VCID-decx-ng47-vfcr
Aliases: CVE-2009-3720 |
A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM. |
Affected by 7 other vulnerabilities. Affected by 31 other vulnerabilities. |
|
VCID-ezsm-xmme-cbd2
Aliases: CVE-2007-1863 |
A bug was found in the mod_cache module. On sites where caching is enabled, a remote attacker could send a carefully crafted request that would cause the Apache child process handling that request to crash. This could lead to a denial of service if using a threaded Multi-Processing Module. |
Affected by 22 other vulnerabilities. Affected by 54 other vulnerabilities. |
|
VCID-f4td-t4gd-wygf
Aliases: CVE-2013-1862 |
mod_rewrite does not filter terminal escape sequences from logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. |
Affected by 0 other vulnerabilities. Affected by 15 other vulnerabilities. |
|
VCID-g2dz-n5yc-eua6
Aliases: CVE-2007-6388 |
A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available. |
Affected by 19 other vulnerabilities. Affected by 49 other vulnerabilities. |
|
VCID-hp9s-1hfz-hycw
Aliases: CVE-2005-2088 |
A flaw occured when using the Apache server as a HTTP proxy. A remote attacker could send a HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, causing Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request. This could allow the bypass of web application firewall protection or lead to cross-site scripting (XSS) attacks. |
Affected by 29 other vulnerabilities. |
|
VCID-kmk5-kvm5-3uev
Aliases: CVE-2005-1268 |
An off-by-one stack overflow was discovered in the mod_ssl CRL verification callback. In order to exploit this issue the Apache server would need to be configured to use a malicious certificate revocation list (CRL) |
Affected by 29 other vulnerabilities. |
|
VCID-kyv7-j49s-4ucj
Aliases: CVE-2005-2491 |
An integer overflow flaw was found in PCRE, a Perl-compatible regular expression library included within httpd. A local user who has the ability to create .htaccess files could create a maliciously crafted regular expression in such as way that they could gain the privileges of a httpd child. |
Affected by 29 other vulnerabilities. |
|
VCID-marp-9ycj-4kfh
Aliases: CVE-2012-0053 |
A flaw was found in the default error response for status code 400. This flaw could be used by an attacker to expose "httpOnly" cookies when no custom ErrorDocument is specified. |
Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
|
VCID-me3e-377v-rqes
Aliases: CVE-2004-0885 |
An issue has been discovered in the mod_ssl module when configured to use the "SSLCipherSuite" directive in directory or location context. If a particular location context has been configured to require a specific set of cipher suites, then a client will be able to access that location using any cipher suite allowed by the virtual host configuration. |
Affected by 35 other vulnerabilities. |
|
VCID-npw5-3hh9-r7fh
Aliases: CVE-2005-3357 |
A NULL pointer dereference flaw in mod_ssl was discovered affecting server configurations where an SSL virtual host is configured with access control and a custom 400 error document. A remote attacker could send a carefully crafted request to trigger this issue which would lead to a crash. This crash would only be a denial of service if using the worker MPM. |
Affected by 27 other vulnerabilities. Affected by 59 other vulnerabilities. |
|
VCID-nq6v-nvbf-zfda
Aliases: CVE-2007-5000 |
A flaw was found in the mod_imagemap module. On sites where mod_imagemap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible. |
Affected by 19 other vulnerabilities. Affected by 49 other vulnerabilities. |
|
VCID-qcwv-72d2-c3cy
Aliases: CVE-2007-3304 |
The Apache HTTP server did not verify that a process was an Apache child process before sending it signals. A local attacker with the ability to run scripts on the HTTP server could manipulate the scoreboard and cause arbitrary processes to be terminated which could lead to a denial of service. |
Affected by 22 other vulnerabilities. Affected by 54 other vulnerabilities. |
|
VCID-rp3y-u9gp-2ygj
Aliases: CVE-2005-2728 |
A flaw in the byterange filter would cause some responses to be buffered into memory. If a server has a dynamic resource such as a CGI script or PHP script which generates a large amount of data, an attacker could send carefully crafted requests in order to consume resources, potentially leading to a Denial of Service. |
Affected by 29 other vulnerabilities. |
|
VCID-sfpu-wh3p-6ffv
Aliases: CVE-2010-0425 |
A flaw was found with within mod_isapi which would attempt to unload the ISAPI dll when it encountered various error states. This could leave the callbacks in an undefined state and result in a segfault. On Windows platforms using mod_isapi, a remote attacker could send a malicious request to trigger this issue, and as win32 MPM runs only one process, this would result in a denial of service, and potentially allow arbitrary code execution. |
Affected by 7 other vulnerabilities. Affected by 35 other vulnerabilities. |
|
VCID-shmb-1ncq-wbgp
Aliases: CVE-2005-3352 |
A flaw in mod_imap when using the Referer directive with image maps. In certain site configurations a remote attacker could perform a cross-site scripting attack if a victim can be forced to visit a malicious URL using certain web browsers. |
Affected by 27 other vulnerabilities. Affected by 59 other vulnerabilities. |
|
VCID-upgx-p9mx-2qew
Aliases: CVE-2008-0005 |
A workaround was added in the mod_proxy_ftp module. On sites where mod_proxy_ftp is enabled and a forward proxy is configured, a cross-site scripting attack is possible against Web browsers which do not correctly derive the response character set following the rules in RFC 2616. |
Affected by 19 other vulnerabilities. Affected by 49 other vulnerabilities. |
|
VCID-w3yn-b9sv-7fey
Aliases: CVE-2007-3847 |
A flaw was found in the Apache HTTP Server mod_proxy module. On sites where a reverse proxy is configured, a remote attacker could send a carefully crafted request that would cause the Apache child process handling that request to crash. On sites where a forward proxy is configured, an attacker could cause a similar crash if a user could be persuaded to visit a malicious site using the proxy. This could lead to a denial of service if using a threaded Multi-Processing Module. |
Affected by 22 other vulnerabilities. Affected by 54 other vulnerabilities. |
|
VCID-x5hy-ecvu-g7c2
Aliases: CVE-2010-1452 |
A flaw was found in the handling of requests by mod_cache (2.2) and mod_dav (2.0 and 2.2). A malicious remote attacker could send a carefully crafted request and cause a httpd child process to crash. This crash would only be a denial of service if using the worker MPM. This issue is further mitigated as mod_dav is only affected by requests that are most likely to be authenticated, and mod_cache is only affected if the uncommon "CacheIgnoreURLSessionIdentifiers" directive, introduced in version 2.2.14, is used. |
Affected by 7 other vulnerabilities. Affected by 33 other vulnerabilities. |
|
VCID-yuy2-dbmk-93f7
Aliases: CVE-2009-1891 |
A denial of service flaw was found in the mod_deflate module. This module continued to compress large files until compression was complete, even if the network connection that requested the content was closed before compression completed. This would cause mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file. |
Affected by 7 other vulnerabilities. Affected by 42 other vulnerabilities. |
|
VCID-z4bh-2y2w-q7f1
Aliases: CVE-2008-2364 |
A flaw was found in the handling of excessive interim responses from an origin server when using mod_proxy_http. A remote attacker could cause a denial of service or high memory usage. |
Affected by 7 other vulnerabilities. Affected by 49 other vulnerabilities. |
|
VCID-z7xa-vrkn-t3bj
Aliases: CVE-2011-3368 |
An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released. Patches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/ |
Affected by 0 other vulnerabilities. Affected by 21 other vulnerabilities. |
|
VCID-zqh4-yaua-zqb3
Aliases: CVE-2010-0434 |
A flaw in the core subrequest process code was fixed, to always provide a shallow copy of the headers_in array to the subrequest, instead of a pointer to the parent request's array as it had for requests without request bodies. This meant all modules such as mod_headers which may manipulate the input headers for a subrequest would poison the parent request in two ways, one by modifying the parent request, which might not be intended, and second by leaving pointers to modified header fields in memory allocated to the subrequest scope, which could be freed before the main request processing was finished, resulting in a segfault or in revealing data from another request on threaded servers, such as the worker or winnt MPMs. |
Affected by 7 other vulnerabilities. Affected by 35 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-dtvu-rj6s-zybk | A flaw in Apache 2.0.51 (only) broke the merging of the Satisfy directive which could result in access being granted to resources despite any configured authentication |
CVE-2004-0811
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2025-07-31T08:28:57.627491+00:00 | Apache HTTPD Importer | Affected by | VCID-f4td-t4gd-wygf | https://httpd.apache.org/security/json/CVE-2013-1862.json | 37.0.0 |
| 2025-07-31T08:28:56.103831+00:00 | Apache HTTPD Importer | Affected by | VCID-marp-9ycj-4kfh | https://httpd.apache.org/security/json/CVE-2012-0053.json | 37.0.0 |
| 2025-07-31T08:28:55.688610+00:00 | Apache HTTPD Importer | Affected by | VCID-7jx2-zgdg-vbbr | https://httpd.apache.org/security/json/CVE-2012-0031.json | 37.0.0 |
| 2025-07-31T08:28:55.096642+00:00 | Apache HTTPD Importer | Affected by | VCID-a5d5-k9b3-pfbm | https://httpd.apache.org/security/json/CVE-2011-3607.json | 37.0.0 |
| 2025-07-31T08:28:54.582326+00:00 | Apache HTTPD Importer | Affected by | VCID-z7xa-vrkn-t3bj | https://httpd.apache.org/security/json/CVE-2011-3368.json | 37.0.0 |
| 2025-07-31T08:28:53.988719+00:00 | Apache HTTPD Importer | Affected by | VCID-39rt-392b-5bey | https://httpd.apache.org/security/json/CVE-2011-3192.json | 37.0.0 |
| 2025-07-31T08:28:53.589638+00:00 | Apache HTTPD Importer | Affected by | VCID-8adb-pxka-97gq | https://httpd.apache.org/security/json/CVE-2011-0419.json | 37.0.0 |
| 2025-07-31T08:28:53.120995+00:00 | Apache HTTPD Importer | Affected by | VCID-cqrd-ejej-uqe9 | https://httpd.apache.org/security/json/CVE-2010-1623.json | 37.0.0 |
| 2025-07-31T08:28:52.762414+00:00 | Apache HTTPD Importer | Affected by | VCID-x5hy-ecvu-g7c2 | https://httpd.apache.org/security/json/CVE-2010-1452.json | 37.0.0 |
| 2025-07-31T08:28:52.410613+00:00 | Apache HTTPD Importer | Affected by | VCID-zqh4-yaua-zqb3 | https://httpd.apache.org/security/json/CVE-2010-0434.json | 37.0.0 |
| 2025-07-31T08:28:52.071600+00:00 | Apache HTTPD Importer | Affected by | VCID-sfpu-wh3p-6ffv | https://httpd.apache.org/security/json/CVE-2010-0425.json | 37.0.0 |
| 2025-07-31T08:28:51.480195+00:00 | Apache HTTPD Importer | Affected by | VCID-decx-ng47-vfcr | https://httpd.apache.org/security/json/CVE-2009-3720.json | 37.0.0 |
| 2025-07-31T08:28:51.115590+00:00 | Apache HTTPD Importer | Affected by | VCID-cjbk-v93c-hyav | https://httpd.apache.org/security/json/CVE-2009-3560.json | 37.0.0 |
| 2025-07-31T08:28:50.787126+00:00 | Apache HTTPD Importer | Affected by | VCID-7f2z-4x67-hqfw | https://httpd.apache.org/security/json/CVE-2009-3095.json | 37.0.0 |
| 2025-07-31T08:28:50.459131+00:00 | Apache HTTPD Importer | Affected by | VCID-17dn-vnzu-eugr | https://httpd.apache.org/security/json/CVE-2009-3094.json | 37.0.0 |
| 2025-07-31T08:28:50.052920+00:00 | Apache HTTPD Importer | Affected by | VCID-2h74-w9ra-wbf7 | https://httpd.apache.org/security/json/CVE-2009-2412.json | 37.0.0 |
| 2025-07-31T08:28:49.587633+00:00 | Apache HTTPD Importer | Affected by | VCID-yuy2-dbmk-93f7 | https://httpd.apache.org/security/json/CVE-2009-1891.json | 37.0.0 |
| 2025-07-31T08:28:49.037994+00:00 | Apache HTTPD Importer | Affected by | VCID-1r9x-9cx9-3far | https://httpd.apache.org/security/json/CVE-2008-2939.json | 37.0.0 |
| 2025-07-31T08:28:48.745942+00:00 | Apache HTTPD Importer | Affected by | VCID-z4bh-2y2w-q7f1 | https://httpd.apache.org/security/json/CVE-2008-2364.json | 37.0.0 |
| 2025-07-31T08:28:48.379368+00:00 | Apache HTTPD Importer | Affected by | VCID-upgx-p9mx-2qew | https://httpd.apache.org/security/json/CVE-2008-0005.json | 37.0.0 |
| 2025-07-31T08:28:47.637400+00:00 | Apache HTTPD Importer | Affected by | VCID-g2dz-n5yc-eua6 | https://httpd.apache.org/security/json/CVE-2007-6388.json | 37.0.0 |
| 2025-07-31T08:28:46.949572+00:00 | Apache HTTPD Importer | Affected by | VCID-nq6v-nvbf-zfda | https://httpd.apache.org/security/json/CVE-2007-5000.json | 37.0.0 |
| 2025-07-31T08:28:46.562002+00:00 | Apache HTTPD Importer | Affected by | VCID-w3yn-b9sv-7fey | https://httpd.apache.org/security/json/CVE-2007-3847.json | 37.0.0 |
| 2025-07-31T08:28:46.002364+00:00 | Apache HTTPD Importer | Affected by | VCID-qcwv-72d2-c3cy | https://httpd.apache.org/security/json/CVE-2007-3304.json | 37.0.0 |
| 2025-07-31T08:28:45.629739+00:00 | Apache HTTPD Importer | Affected by | VCID-ezsm-xmme-cbd2 | https://httpd.apache.org/security/json/CVE-2007-1863.json | 37.0.0 |
| 2025-07-31T08:28:45.066409+00:00 | Apache HTTPD Importer | Affected by | VCID-8rr4-7xg6-8bfk | https://httpd.apache.org/security/json/CVE-2006-5752.json | 37.0.0 |
| 2025-07-31T08:28:44.455393+00:00 | Apache HTTPD Importer | Affected by | VCID-cj89-ap45-jueq | https://httpd.apache.org/security/json/CVE-2006-3747.json | 37.0.0 |
| 2025-07-31T08:28:44.254484+00:00 | Apache HTTPD Importer | Affected by | VCID-npw5-3hh9-r7fh | https://httpd.apache.org/security/json/CVE-2005-3357.json | 37.0.0 |
| 2025-07-31T08:28:43.802381+00:00 | Apache HTTPD Importer | Affected by | VCID-shmb-1ncq-wbgp | https://httpd.apache.org/security/json/CVE-2005-3352.json | 37.0.0 |
| 2025-07-31T08:28:43.576596+00:00 | Apache HTTPD Importer | Affected by | VCID-ddmx-yewy-n7hd | https://httpd.apache.org/security/json/CVE-2005-2970.json | 37.0.0 |
| 2025-07-31T08:28:43.466641+00:00 | Apache HTTPD Importer | Affected by | VCID-rp3y-u9gp-2ygj | https://httpd.apache.org/security/json/CVE-2005-2728.json | 37.0.0 |
| 2025-07-31T08:28:43.350007+00:00 | Apache HTTPD Importer | Affected by | VCID-2gy9-knuh-23et | https://httpd.apache.org/security/json/CVE-2005-2700.json | 37.0.0 |
| 2025-07-31T08:28:43.239516+00:00 | Apache HTTPD Importer | Affected by | VCID-kyv7-j49s-4ucj | https://httpd.apache.org/security/json/CVE-2005-2491.json | 37.0.0 |
| 2025-07-31T08:28:43.128089+00:00 | Apache HTTPD Importer | Affected by | VCID-hp9s-1hfz-hycw | https://httpd.apache.org/security/json/CVE-2005-2088.json | 37.0.0 |
| 2025-07-31T08:28:43.014460+00:00 | Apache HTTPD Importer | Affected by | VCID-kmk5-kvm5-3uev | https://httpd.apache.org/security/json/CVE-2005-1268.json | 37.0.0 |
| 2025-07-31T08:28:42.910808+00:00 | Apache HTTPD Importer | Affected by | VCID-6tnh-h3yx-hugn | https://httpd.apache.org/security/json/CVE-2004-1834.json | 37.0.0 |
| 2025-07-31T08:28:42.806076+00:00 | Apache HTTPD Importer | Affected by | VCID-68d6-q8af-83b7 | https://httpd.apache.org/security/json/CVE-2004-0942.json | 37.0.0 |
| 2025-07-31T08:28:42.575214+00:00 | Apache HTTPD Importer | Affected by | VCID-me3e-377v-rqes | https://httpd.apache.org/security/json/CVE-2004-0885.json | 37.0.0 |
| 2025-07-31T08:28:42.479088+00:00 | Apache HTTPD Importer | Fixing | VCID-dtvu-rj6s-zybk | https://httpd.apache.org/security/json/CVE-2004-0811.json | 37.0.0 |