Search for packages
purl | pkg:apache/httpd@2.2.9 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1awx-fb64-aaae
Aliases: CVE-2017-3167 |
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 34 other vulnerabilities. |
VCID-1pf4-rzru-aaak
Aliases: CVE-2015-3183 |
The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 8 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 30 other vulnerabilities. |
VCID-1sxy-v71c-aaah
Aliases: CVE-2009-1956 |
Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input. |
Affected by 42 other vulnerabilities. |
VCID-29gg-v4hb-aaak
Aliases: CVE-2011-3192 |
The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086. |
Affected by 29 other vulnerabilities. |
VCID-2cgf-57ed-aaap
Aliases: CVE-2017-9798 |
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 31 other vulnerabilities. |
VCID-2tq2-wbv4-aaab
Aliases: CVE-2009-2699 |
The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs. |
Affected by 38 other vulnerabilities. |
VCID-3fug-88kc-aaaa
Aliases: CVE-2010-2791 |
mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions. |
Affected by 47 other vulnerabilities. |
VCID-5rut-tj2x-aaap
Aliases: CVE-2011-4317 |
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368. |
Affected by 21 other vulnerabilities. |
VCID-5zd4-jd9e-aaac
Aliases: CVE-2014-0098 |
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation. |
Affected by 13 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 41 other vulnerabilities. |
VCID-8dyd-depr-aaam
Aliases: CVE-2009-3560 |
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720. |
Affected by 31 other vulnerabilities. |
VCID-964c-4tbk-aaan
Aliases: CVE-2010-0408 |
The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code. |
Affected by 35 other vulnerabilities. |
VCID-9khq-s81v-aaaf
Aliases: CVE-2008-0456 |
CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file. |
Affected by 42 other vulnerabilities. |
VCID-9w5c-q5bk-aaae
Aliases: CVE-2012-4558 |
Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string. |
Affected by 15 other vulnerabilities. Affected by 40 other vulnerabilities. |
VCID-a61m-1sk9-aaaj
Aliases: CVE-2010-0434 |
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request. |
Affected by 35 other vulnerabilities. |
VCID-c7e7-cdc7-aaam
Aliases: CVE-2009-3720 |
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625. |
Affected by 31 other vulnerabilities. |
VCID-cxt1-n6br-aaaf
Aliases: CVE-2012-0053 |
protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. |
Affected by 21 other vulnerabilities. |
VCID-d59r-2grq-aaab
Aliases: CVE-2010-2068 |
mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. |
Affected by 33 other vulnerabilities. |
VCID-dmwk-usu8-aaas
Aliases: CVE-2013-6438 |
The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request. |
Affected by 13 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 41 other vulnerabilities. |
VCID-dq5v-7ymd-aaaq
Aliases: CVE-2009-3095 |
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. |
Affected by 38 other vulnerabilities. |
VCID-evyq-x542-aaaj
Aliases: CVE-2014-0226 |
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c. |
Affected by 0 other vulnerabilities. Affected by 9 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 37 other vulnerabilities. |
VCID-g44f-ek3a-aaak
Aliases: CVE-2009-0023 |
The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow. |
Affected by 42 other vulnerabilities. |
VCID-g5wc-xh9z-aaaf
Aliases: CVE-2017-7679 |
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 34 other vulnerabilities. |
VCID-g7gd-zfmv-aaae
Aliases: CVE-2016-4975 |
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31). |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 6 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 38 other vulnerabilities. |
VCID-gjk7-z8g3-aaaq
Aliases: CVE-2011-3607 |
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. |
Affected by 21 other vulnerabilities. |
VCID-hvbx-3ykq-aaan
Aliases: CVE-2013-1862 |
mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. |
Affected by 15 other vulnerabilities. Affected by 15 other vulnerabilities. |
VCID-kraa-vyt2-aaaa
Aliases: CVE-2017-9788 |
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 32 other vulnerabilities. |
VCID-n958-rf3k-aaan
Aliases: CVE-2012-2687 |
Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list. |
Affected by 19 other vulnerabilities. Affected by 42 other vulnerabilities. |
VCID-p4wk-zcuh-aaad
Aliases: CVE-2009-1891 |
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption). |
Affected by 42 other vulnerabilities. |
VCID-pm2k-zdhx-aaam
Aliases: CVE-2017-3169 |
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 34 other vulnerabilities. |
VCID-q1pj-pmht-aaam
Aliases: CVE-2013-1896 |
mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI. |
Affected by 15 other vulnerabilities. Affected by 15 other vulnerabilities. Affected by 1 other vulnerability. Affected by 42 other vulnerabilities. |
VCID-qhh5-wcj1-aaae
Aliases: CVE-2008-2939 |
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI. |
Affected by 47 other vulnerabilities. |
VCID-rxf1-1k5a-aaam
Aliases: CVE-2010-1623 |
Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket. |
Affected by 31 other vulnerabilities. |
VCID-ryex-1mb4-aaap
Aliases: CVE-2016-5387 |
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 6 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 38 other vulnerabilities. |
VCID-sh71-kuxa-aaag
Aliases: CVE-2012-0883 |
envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl. |
Affected by 19 other vulnerabilities. Affected by 44 other vulnerabilities. |
VCID-t9hu-6b2h-aaae
Aliases: CVE-2010-1452 |
The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path. |
Affected by 33 other vulnerabilities. |
VCID-tepv-qzma-aaab
Aliases: CVE-2009-1955 |
The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564. |
Affected by 42 other vulnerabilities. |
VCID-tnc6-bvst-aaan
Aliases: CVE-2013-5704 |
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such." |
Affected by 0 other vulnerabilities. Affected by 9 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 34 other vulnerabilities. |
VCID-u4qv-snzv-aaaq
Aliases: CVE-2009-1890 |
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests. |
Affected by 42 other vulnerabilities. |
VCID-u7ab-vxf1-aaak
Aliases: CVE-2009-1195 |
The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file. |
Affected by 42 other vulnerabilities. |
VCID-us96-4dyu-aaad
Aliases: CVE-2009-2412 |
Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information. |
Affected by 41 other vulnerabilities. |
VCID-w5ba-fmfs-aaam
Aliases: CVE-2011-0419 |
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. |
Affected by 30 other vulnerabilities. |
VCID-wf8u-9fv3-aaap
Aliases: CVE-2016-8743 |
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 6 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 38 other vulnerabilities. |
VCID-wmsx-921j-aaam
Aliases: CVE-2012-3499 |
Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules. |
Affected by 15 other vulnerabilities. Affected by 40 other vulnerabilities. |
VCID-wyfa-5v5x-aaam
Aliases: CVE-2011-3368 |
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character. |
Affected by 21 other vulnerabilities. |
VCID-xfau-vqn8-aaah
Aliases: CVE-2010-0425 |
modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers." |
Affected by 35 other vulnerabilities. |
VCID-xjt7-2ew4-aaaj
Aliases: CVE-2014-0118 |
The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size. |
Affected by 0 other vulnerabilities. Affected by 9 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 37 other vulnerabilities. |
VCID-xqb8-4zzf-aaae
Aliases: CVE-2014-0231 |
The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor. |
Affected by 0 other vulnerabilities. Affected by 9 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 37 other vulnerabilities. |
VCID-y8n2-ru9b-aaac
Aliases: CVE-2012-0031 |
scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function. |
Affected by 21 other vulnerabilities. |
VCID-z2dp-keth-aaan
Aliases: CVE-2009-3094 |
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command. |
Affected by 38 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-1b55-3v62-aaar | Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors. |
CVE-2007-6420
|
VCID-j1rr-k9yr-aaae | The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses. |
CVE-2008-2364
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T12:34:53.276599+00:00 | Apache HTTPD Importer | Affected by | VCID-2cgf-57ed-aaap | https://httpd.apache.org/security/json/CVE-2017-9798.json | 36.0.0 |
2025-03-28T12:34:52.811234+00:00 | Apache HTTPD Importer | Affected by | VCID-kraa-vyt2-aaaa | https://httpd.apache.org/security/json/CVE-2017-9788.json | 36.0.0 |
2025-03-28T12:34:52.375434+00:00 | Apache HTTPD Importer | Affected by | VCID-g5wc-xh9z-aaaf | https://httpd.apache.org/security/json/CVE-2017-7679.json | 36.0.0 |
2025-03-28T12:34:51.876715+00:00 | Apache HTTPD Importer | Affected by | VCID-pm2k-zdhx-aaam | https://httpd.apache.org/security/json/CVE-2017-3169.json | 36.0.0 |
2025-03-28T12:34:51.441428+00:00 | Apache HTTPD Importer | Affected by | VCID-1awx-fb64-aaae | https://httpd.apache.org/security/json/CVE-2017-3167.json | 36.0.0 |
2025-03-28T12:34:51.021427+00:00 | Apache HTTPD Importer | Affected by | VCID-wf8u-9fv3-aaap | https://httpd.apache.org/security/json/CVE-2016-8743.json | 36.0.0 |
2025-03-28T12:34:50.570164+00:00 | Apache HTTPD Importer | Affected by | VCID-ryex-1mb4-aaap | https://httpd.apache.org/security/json/CVE-2016-5387.json | 36.0.0 |
2025-03-28T12:34:50.128629+00:00 | Apache HTTPD Importer | Affected by | VCID-g7gd-zfmv-aaae | https://httpd.apache.org/security/json/CVE-2016-4975.json | 36.0.0 |
2025-03-28T12:34:49.498706+00:00 | Apache HTTPD Importer | Affected by | VCID-1pf4-rzru-aaak | https://httpd.apache.org/security/json/CVE-2015-3183.json | 36.0.0 |
2025-03-28T12:34:48.929972+00:00 | Apache HTTPD Importer | Affected by | VCID-xqb8-4zzf-aaae | https://httpd.apache.org/security/json/CVE-2014-0231.json | 36.0.0 |
2025-03-28T12:34:48.597220+00:00 | Apache HTTPD Importer | Affected by | VCID-evyq-x542-aaaj | https://httpd.apache.org/security/json/CVE-2014-0226.json | 36.0.0 |
2025-03-28T12:34:48.264137+00:00 | Apache HTTPD Importer | Affected by | VCID-xjt7-2ew4-aaaj | https://httpd.apache.org/security/json/CVE-2014-0118.json | 36.0.0 |
2025-03-28T12:34:47.918969+00:00 | Apache HTTPD Importer | Affected by | VCID-5zd4-jd9e-aaac | https://httpd.apache.org/security/json/CVE-2014-0098.json | 36.0.0 |
2025-03-28T12:34:47.604974+00:00 | Apache HTTPD Importer | Affected by | VCID-dmwk-usu8-aaas | https://httpd.apache.org/security/json/CVE-2013-6438.json | 36.0.0 |
2025-03-28T12:34:47.262851+00:00 | Apache HTTPD Importer | Affected by | VCID-tnc6-bvst-aaan | https://httpd.apache.org/security/json/CVE-2013-5704.json | 36.0.0 |
2025-03-28T12:34:46.938832+00:00 | Apache HTTPD Importer | Affected by | VCID-q1pj-pmht-aaam | https://httpd.apache.org/security/json/CVE-2013-1896.json | 36.0.0 |
2025-03-28T12:34:46.605426+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 36.0.0 |
2025-03-28T12:34:46.223129+00:00 | Apache HTTPD Importer | Affected by | VCID-9w5c-q5bk-aaae | https://httpd.apache.org/security/json/CVE-2012-4558.json | 36.0.0 |
2025-03-28T12:34:45.873891+00:00 | Apache HTTPD Importer | Affected by | VCID-wmsx-921j-aaam | https://httpd.apache.org/security/json/CVE-2012-3499.json | 36.0.0 |
2025-03-28T12:34:45.632630+00:00 | Apache HTTPD Importer | Affected by | VCID-n958-rf3k-aaan | https://httpd.apache.org/security/json/CVE-2012-2687.json | 36.0.0 |
2025-03-28T12:34:45.398443+00:00 | Apache HTTPD Importer | Affected by | VCID-sh71-kuxa-aaag | https://httpd.apache.org/security/json/CVE-2012-0883.json | 36.0.0 |
2025-03-28T12:34:45.083232+00:00 | Apache HTTPD Importer | Affected by | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 36.0.0 |
2025-03-28T12:34:44.644785+00:00 | Apache HTTPD Importer | Affected by | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 36.0.0 |
2025-03-28T12:34:44.364756+00:00 | Apache HTTPD Importer | Affected by | VCID-5rut-tj2x-aaap | https://httpd.apache.org/security/json/CVE-2011-4317.json | 36.0.0 |
2025-03-28T12:34:44.051249+00:00 | Apache HTTPD Importer | Affected by | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 36.0.0 |
2025-03-28T12:34:43.500853+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 36.0.0 |
2025-03-28T12:34:42.883842+00:00 | Apache HTTPD Importer | Affected by | VCID-29gg-v4hb-aaak | https://httpd.apache.org/security/json/CVE-2011-3192.json | 36.0.0 |
2025-03-28T12:34:42.473552+00:00 | Apache HTTPD Importer | Affected by | VCID-w5ba-fmfs-aaam | https://httpd.apache.org/security/json/CVE-2011-0419.json | 36.0.0 |
2025-03-28T12:34:42.294876+00:00 | Apache HTTPD Importer | Affected by | VCID-3fug-88kc-aaaa | https://httpd.apache.org/security/json/CVE-2010-2791.json | 36.0.0 |
2025-03-28T12:34:42.235482+00:00 | Apache HTTPD Importer | Affected by | VCID-d59r-2grq-aaab | https://httpd.apache.org/security/json/CVE-2010-2068.json | 36.0.0 |
2025-03-28T12:34:42.006678+00:00 | Apache HTTPD Importer | Affected by | VCID-rxf1-1k5a-aaam | https://httpd.apache.org/security/json/CVE-2010-1623.json | 36.0.0 |
2025-03-28T12:34:41.635260+00:00 | Apache HTTPD Importer | Affected by | VCID-t9hu-6b2h-aaae | https://httpd.apache.org/security/json/CVE-2010-1452.json | 36.0.0 |
2025-03-28T12:34:41.271338+00:00 | Apache HTTPD Importer | Affected by | VCID-a61m-1sk9-aaaj | https://httpd.apache.org/security/json/CVE-2010-0434.json | 36.0.0 |
2025-03-28T12:34:40.916323+00:00 | Apache HTTPD Importer | Affected by | VCID-xfau-vqn8-aaah | https://httpd.apache.org/security/json/CVE-2010-0425.json | 36.0.0 |
2025-03-28T12:34:40.727150+00:00 | Apache HTTPD Importer | Affected by | VCID-964c-4tbk-aaan | https://httpd.apache.org/security/json/CVE-2010-0408.json | 36.0.0 |
2025-03-28T12:34:40.310194+00:00 | Apache HTTPD Importer | Affected by | VCID-c7e7-cdc7-aaam | https://httpd.apache.org/security/json/CVE-2009-3720.json | 36.0.0 |
2025-03-28T12:34:39.929999+00:00 | Apache HTTPD Importer | Affected by | VCID-8dyd-depr-aaam | https://httpd.apache.org/security/json/CVE-2009-3560.json | 36.0.0 |
2025-03-28T12:34:39.577321+00:00 | Apache HTTPD Importer | Affected by | VCID-dq5v-7ymd-aaaq | https://httpd.apache.org/security/json/CVE-2009-3095.json | 36.0.0 |
2025-03-28T12:34:39.225479+00:00 | Apache HTTPD Importer | Affected by | VCID-z2dp-keth-aaan | https://httpd.apache.org/security/json/CVE-2009-3094.json | 36.0.0 |
2025-03-28T12:34:39.027831+00:00 | Apache HTTPD Importer | Affected by | VCID-2tq2-wbv4-aaab | https://httpd.apache.org/security/json/CVE-2009-2699.json | 36.0.0 |
2025-03-28T12:34:38.796666+00:00 | Apache HTTPD Importer | Affected by | VCID-us96-4dyu-aaad | https://httpd.apache.org/security/json/CVE-2009-2412.json | 36.0.0 |
2025-03-28T12:34:38.607518+00:00 | Apache HTTPD Importer | Affected by | VCID-1sxy-v71c-aaah | https://httpd.apache.org/security/json/CVE-2009-1956.json | 36.0.0 |
2025-03-28T12:34:38.539820+00:00 | Apache HTTPD Importer | Affected by | VCID-tepv-qzma-aaab | https://httpd.apache.org/security/json/CVE-2009-1955.json | 36.0.0 |
2025-03-28T12:34:38.322391+00:00 | Apache HTTPD Importer | Affected by | VCID-p4wk-zcuh-aaad | https://httpd.apache.org/security/json/CVE-2009-1891.json | 36.0.0 |
2025-03-28T12:34:38.137806+00:00 | Apache HTTPD Importer | Affected by | VCID-u4qv-snzv-aaaq | https://httpd.apache.org/security/json/CVE-2009-1890.json | 36.0.0 |
2025-03-28T12:34:38.071736+00:00 | Apache HTTPD Importer | Affected by | VCID-u7ab-vxf1-aaak | https://httpd.apache.org/security/json/CVE-2009-1195.json | 36.0.0 |
2025-03-28T12:34:37.987530+00:00 | Apache HTTPD Importer | Affected by | VCID-g44f-ek3a-aaak | https://httpd.apache.org/security/json/CVE-2009-0023.json | 36.0.0 |
2025-03-28T12:34:37.786404+00:00 | Apache HTTPD Importer | Affected by | VCID-qhh5-wcj1-aaae | https://httpd.apache.org/security/json/CVE-2008-2939.json | 36.0.0 |
2025-03-28T12:34:37.616961+00:00 | Apache HTTPD Importer | Fixing | VCID-j1rr-k9yr-aaae | https://httpd.apache.org/security/json/CVE-2008-2364.json | 36.0.0 |
2025-03-28T12:34:37.296317+00:00 | Apache HTTPD Importer | Affected by | VCID-9khq-s81v-aaaf | https://httpd.apache.org/security/json/CVE-2008-0456.json | 36.0.0 |
2025-03-28T12:34:36.868004+00:00 | Apache HTTPD Importer | Fixing | VCID-1b55-3v62-aaar | https://httpd.apache.org/security/json/CVE-2007-6420.json | 36.0.0 |
2024-11-18T22:52:58.420024+00:00 | Apache HTTPD Importer | Affected by | VCID-2cgf-57ed-aaap | https://httpd.apache.org/security/json/CVE-2017-9798.json | 34.3.2 |
2024-11-18T22:52:57.543706+00:00 | Apache HTTPD Importer | Affected by | VCID-kraa-vyt2-aaaa | https://httpd.apache.org/security/json/CVE-2017-9788.json | 34.3.2 |
2024-11-18T22:52:56.849795+00:00 | Apache HTTPD Importer | Affected by | VCID-g5wc-xh9z-aaaf | https://httpd.apache.org/security/json/CVE-2017-7679.json | 34.3.2 |
2024-11-18T22:52:55.698039+00:00 | Apache HTTPD Importer | Affected by | VCID-pm2k-zdhx-aaam | https://httpd.apache.org/security/json/CVE-2017-3169.json | 34.3.2 |
2024-11-18T22:52:55.010407+00:00 | Apache HTTPD Importer | Affected by | VCID-1awx-fb64-aaae | https://httpd.apache.org/security/json/CVE-2017-3167.json | 34.3.2 |
2024-11-18T22:52:54.355581+00:00 | Apache HTTPD Importer | Affected by | VCID-wf8u-9fv3-aaap | https://httpd.apache.org/security/json/CVE-2016-8743.json | 34.3.2 |
2024-11-18T22:52:53.533998+00:00 | Apache HTTPD Importer | Affected by | VCID-ryex-1mb4-aaap | https://httpd.apache.org/security/json/CVE-2016-5387.json | 34.3.2 |
2024-11-18T22:52:52.721827+00:00 | Apache HTTPD Importer | Affected by | VCID-g7gd-zfmv-aaae | https://httpd.apache.org/security/json/CVE-2016-4975.json | 34.3.2 |
2024-11-18T22:52:51.324239+00:00 | Apache HTTPD Importer | Affected by | VCID-1pf4-rzru-aaak | https://httpd.apache.org/security/json/CVE-2015-3183.json | 34.3.2 |
2024-11-18T22:52:49.695932+00:00 | Apache HTTPD Importer | Affected by | VCID-xqb8-4zzf-aaae | https://httpd.apache.org/security/json/CVE-2014-0231.json | 34.3.2 |
2024-11-18T22:52:49.117387+00:00 | Apache HTTPD Importer | Affected by | VCID-evyq-x542-aaaj | https://httpd.apache.org/security/json/CVE-2014-0226.json | 34.3.2 |
2024-11-18T22:52:48.542051+00:00 | Apache HTTPD Importer | Affected by | VCID-xjt7-2ew4-aaaj | https://httpd.apache.org/security/json/CVE-2014-0118.json | 34.3.2 |
2024-11-18T22:52:47.812550+00:00 | Apache HTTPD Importer | Affected by | VCID-5zd4-jd9e-aaac | https://httpd.apache.org/security/json/CVE-2014-0098.json | 34.3.2 |
2024-11-18T22:52:47.252493+00:00 | Apache HTTPD Importer | Affected by | VCID-dmwk-usu8-aaas | https://httpd.apache.org/security/json/CVE-2013-6438.json | 34.3.2 |
2024-11-18T22:52:46.666262+00:00 | Apache HTTPD Importer | Affected by | VCID-tnc6-bvst-aaan | https://httpd.apache.org/security/json/CVE-2013-5704.json | 34.3.2 |
2024-11-18T22:52:45.817625+00:00 | Apache HTTPD Importer | Affected by | VCID-q1pj-pmht-aaam | https://httpd.apache.org/security/json/CVE-2013-1896.json | 34.3.2 |
2024-11-18T22:52:45.221362+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 34.3.2 |
2024-11-18T22:52:44.577572+00:00 | Apache HTTPD Importer | Affected by | VCID-9w5c-q5bk-aaae | https://httpd.apache.org/security/json/CVE-2012-4558.json | 34.3.2 |
2024-11-18T22:52:43.700603+00:00 | Apache HTTPD Importer | Affected by | VCID-wmsx-921j-aaam | https://httpd.apache.org/security/json/CVE-2012-3499.json | 34.3.2 |
2024-11-18T22:52:43.188259+00:00 | Apache HTTPD Importer | Affected by | VCID-n958-rf3k-aaan | https://httpd.apache.org/security/json/CVE-2012-2687.json | 34.3.2 |
2024-11-18T22:52:42.674537+00:00 | Apache HTTPD Importer | Affected by | VCID-sh71-kuxa-aaag | https://httpd.apache.org/security/json/CVE-2012-0883.json | 34.3.2 |
2024-11-18T22:52:42.104543+00:00 | Apache HTTPD Importer | Affected by | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 34.3.2 |
2024-11-18T22:52:41.417735+00:00 | Apache HTTPD Importer | Affected by | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 34.3.2 |
2024-11-18T22:52:40.868799+00:00 | Apache HTTPD Importer | Affected by | VCID-5rut-tj2x-aaap | https://httpd.apache.org/security/json/CVE-2011-4317.json | 34.3.2 |
2024-11-18T22:52:40.307342+00:00 | Apache HTTPD Importer | Affected by | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 34.3.2 |
2024-11-18T22:52:39.518021+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 34.3.2 |
2024-11-18T22:52:38.504489+00:00 | Apache HTTPD Importer | Affected by | VCID-29gg-v4hb-aaak | https://httpd.apache.org/security/json/CVE-2011-3192.json | 34.3.2 |
2024-11-18T22:52:37.844785+00:00 | Apache HTTPD Importer | Affected by | VCID-w5ba-fmfs-aaam | https://httpd.apache.org/security/json/CVE-2011-0419.json | 34.3.2 |
2024-11-18T22:52:37.537115+00:00 | Apache HTTPD Importer | Affected by | VCID-3fug-88kc-aaaa | https://httpd.apache.org/security/json/CVE-2010-2791.json | 34.3.2 |
2024-11-18T22:52:37.336025+00:00 | Apache HTTPD Importer | Affected by | VCID-d59r-2grq-aaab | https://httpd.apache.org/security/json/CVE-2010-2068.json | 34.3.2 |
2024-11-18T22:52:36.845095+00:00 | Apache HTTPD Importer | Affected by | VCID-rxf1-1k5a-aaam | https://httpd.apache.org/security/json/CVE-2010-1623.json | 34.3.2 |
2024-11-18T22:52:36.224281+00:00 | Apache HTTPD Importer | Affected by | VCID-t9hu-6b2h-aaae | https://httpd.apache.org/security/json/CVE-2010-1452.json | 34.3.2 |
2024-11-18T22:52:35.604842+00:00 | Apache HTTPD Importer | Affected by | VCID-a61m-1sk9-aaaj | https://httpd.apache.org/security/json/CVE-2010-0434.json | 34.3.2 |
2024-11-18T22:52:34.993712+00:00 | Apache HTTPD Importer | Affected by | VCID-xfau-vqn8-aaah | https://httpd.apache.org/security/json/CVE-2010-0425.json | 34.3.2 |
2024-11-18T22:52:34.677133+00:00 | Apache HTTPD Importer | Affected by | VCID-964c-4tbk-aaan | https://httpd.apache.org/security/json/CVE-2010-0408.json | 34.3.2 |
2024-11-18T22:52:33.880802+00:00 | Apache HTTPD Importer | Affected by | VCID-c7e7-cdc7-aaam | https://httpd.apache.org/security/json/CVE-2009-3720.json | 34.3.2 |
2024-11-18T22:52:33.257702+00:00 | Apache HTTPD Importer | Affected by | VCID-8dyd-depr-aaam | https://httpd.apache.org/security/json/CVE-2009-3560.json | 34.3.2 |
2024-11-18T22:52:32.648211+00:00 | Apache HTTPD Importer | Affected by | VCID-dq5v-7ymd-aaaq | https://httpd.apache.org/security/json/CVE-2009-3095.json | 34.3.2 |
2024-11-18T22:52:32.034122+00:00 | Apache HTTPD Importer | Affected by | VCID-z2dp-keth-aaan | https://httpd.apache.org/security/json/CVE-2009-3094.json | 34.3.2 |
2024-11-18T22:52:31.704996+00:00 | Apache HTTPD Importer | Affected by | VCID-2tq2-wbv4-aaab | https://httpd.apache.org/security/json/CVE-2009-2699.json | 34.3.2 |
2024-11-18T22:52:31.213698+00:00 | Apache HTTPD Importer | Affected by | VCID-us96-4dyu-aaad | https://httpd.apache.org/security/json/CVE-2009-2412.json | 34.3.2 |
2024-11-18T22:52:30.896810+00:00 | Apache HTTPD Importer | Affected by | VCID-1sxy-v71c-aaah | https://httpd.apache.org/security/json/CVE-2009-1956.json | 34.3.2 |
2024-11-18T22:52:30.675702+00:00 | Apache HTTPD Importer | Affected by | VCID-tepv-qzma-aaab | https://httpd.apache.org/security/json/CVE-2009-1955.json | 34.3.2 |
2024-11-18T22:52:30.191838+00:00 | Apache HTTPD Importer | Affected by | VCID-p4wk-zcuh-aaad | https://httpd.apache.org/security/json/CVE-2009-1891.json | 34.3.2 |
2024-11-18T22:52:29.872820+00:00 | Apache HTTPD Importer | Affected by | VCID-u4qv-snzv-aaaq | https://httpd.apache.org/security/json/CVE-2009-1890.json | 34.3.2 |
2024-11-18T22:52:29.668858+00:00 | Apache HTTPD Importer | Affected by | VCID-u7ab-vxf1-aaak | https://httpd.apache.org/security/json/CVE-2009-1195.json | 34.3.2 |
2024-11-18T22:52:29.305750+00:00 | Apache HTTPD Importer | Affected by | VCID-g44f-ek3a-aaak | https://httpd.apache.org/security/json/CVE-2009-0023.json | 34.3.2 |
2024-11-18T22:52:28.841421+00:00 | Apache HTTPD Importer | Affected by | VCID-qhh5-wcj1-aaae | https://httpd.apache.org/security/json/CVE-2008-2939.json | 34.3.2 |
2024-11-18T22:52:28.547285+00:00 | Apache HTTPD Importer | Fixing | VCID-j1rr-k9yr-aaae | https://httpd.apache.org/security/json/CVE-2008-2364.json | 34.3.2 |
2024-11-18T22:52:27.970506+00:00 | Apache HTTPD Importer | Affected by | VCID-9khq-s81v-aaaf | https://httpd.apache.org/security/json/CVE-2008-0456.json | 34.3.2 |
2024-11-18T22:52:26.881400+00:00 | Apache HTTPD Importer | Fixing | VCID-1b55-3v62-aaar | https://httpd.apache.org/security/json/CVE-2007-6420.json | 34.3.2 |
2024-01-04T01:33:40.082386+00:00 | Apache HTTPD Importer | Affected by | VCID-2cgf-57ed-aaap | https://httpd.apache.org/security/json/CVE-2017-9798.json | 34.0.0rc1 |
2024-01-04T01:33:39.633416+00:00 | Apache HTTPD Importer | Affected by | VCID-kraa-vyt2-aaaa | https://httpd.apache.org/security/json/CVE-2017-9788.json | 34.0.0rc1 |
2024-01-04T01:33:39.212080+00:00 | Apache HTTPD Importer | Affected by | VCID-g5wc-xh9z-aaaf | https://httpd.apache.org/security/json/CVE-2017-7679.json | 34.0.0rc1 |
2024-01-04T01:33:38.727545+00:00 | Apache HTTPD Importer | Affected by | VCID-pm2k-zdhx-aaam | https://httpd.apache.org/security/json/CVE-2017-3169.json | 34.0.0rc1 |
2024-01-04T01:33:38.312529+00:00 | Apache HTTPD Importer | Affected by | VCID-1awx-fb64-aaae | https://httpd.apache.org/security/json/CVE-2017-3167.json | 34.0.0rc1 |
2024-01-04T01:33:37.910583+00:00 | Apache HTTPD Importer | Affected by | VCID-wf8u-9fv3-aaap | https://httpd.apache.org/security/json/CVE-2016-8743.json | 34.0.0rc1 |
2024-01-04T01:33:37.471191+00:00 | Apache HTTPD Importer | Affected by | VCID-ryex-1mb4-aaap | https://httpd.apache.org/security/json/CVE-2016-5387.json | 34.0.0rc1 |
2024-01-04T01:33:37.042325+00:00 | Apache HTTPD Importer | Affected by | VCID-g7gd-zfmv-aaae | https://httpd.apache.org/security/json/CVE-2016-4975.json | 34.0.0rc1 |
2024-01-04T01:33:36.410901+00:00 | Apache HTTPD Importer | Affected by | VCID-1pf4-rzru-aaak | https://httpd.apache.org/security/json/CVE-2015-3183.json | 34.0.0rc1 |
2024-01-04T01:33:35.834943+00:00 | Apache HTTPD Importer | Affected by | VCID-xqb8-4zzf-aaae | https://httpd.apache.org/security/json/CVE-2014-0231.json | 34.0.0rc1 |
2024-01-04T01:33:35.511911+00:00 | Apache HTTPD Importer | Affected by | VCID-evyq-x542-aaaj | https://httpd.apache.org/security/json/CVE-2014-0226.json | 34.0.0rc1 |
2024-01-04T01:33:35.190921+00:00 | Apache HTTPD Importer | Affected by | VCID-xjt7-2ew4-aaaj | https://httpd.apache.org/security/json/CVE-2014-0118.json | 34.0.0rc1 |
2024-01-04T01:33:34.847455+00:00 | Apache HTTPD Importer | Affected by | VCID-5zd4-jd9e-aaac | https://httpd.apache.org/security/json/CVE-2014-0098.json | 34.0.0rc1 |
2024-01-04T01:33:34.533740+00:00 | Apache HTTPD Importer | Affected by | VCID-dmwk-usu8-aaas | https://httpd.apache.org/security/json/CVE-2013-6438.json | 34.0.0rc1 |
2024-01-04T01:33:34.181488+00:00 | Apache HTTPD Importer | Affected by | VCID-tnc6-bvst-aaan | https://httpd.apache.org/security/json/CVE-2013-5704.json | 34.0.0rc1 |
2024-01-04T01:33:33.854972+00:00 | Apache HTTPD Importer | Affected by | VCID-q1pj-pmht-aaam | https://httpd.apache.org/security/json/CVE-2013-1896.json | 34.0.0rc1 |
2024-01-04T01:33:33.534967+00:00 | Apache HTTPD Importer | Affected by | VCID-hvbx-3ykq-aaan | https://httpd.apache.org/security/json/CVE-2013-1862.json | 34.0.0rc1 |
2024-01-04T01:33:33.157537+00:00 | Apache HTTPD Importer | Affected by | VCID-9w5c-q5bk-aaae | https://httpd.apache.org/security/json/CVE-2012-4558.json | 34.0.0rc1 |
2024-01-04T01:33:32.812825+00:00 | Apache HTTPD Importer | Affected by | VCID-wmsx-921j-aaam | https://httpd.apache.org/security/json/CVE-2012-3499.json | 34.0.0rc1 |
2024-01-04T01:33:32.581840+00:00 | Apache HTTPD Importer | Affected by | VCID-n958-rf3k-aaan | https://httpd.apache.org/security/json/CVE-2012-2687.json | 34.0.0rc1 |
2024-01-04T01:33:32.356127+00:00 | Apache HTTPD Importer | Affected by | VCID-sh71-kuxa-aaag | https://httpd.apache.org/security/json/CVE-2012-0883.json | 34.0.0rc1 |
2024-01-04T01:33:32.051471+00:00 | Apache HTTPD Importer | Affected by | VCID-cxt1-n6br-aaaf | https://httpd.apache.org/security/json/CVE-2012-0053.json | 34.0.0rc1 |
2024-01-04T01:33:31.631517+00:00 | Apache HTTPD Importer | Affected by | VCID-y8n2-ru9b-aaac | https://httpd.apache.org/security/json/CVE-2012-0031.json | 34.0.0rc1 |
2024-01-04T01:33:31.348129+00:00 | Apache HTTPD Importer | Affected by | VCID-5rut-tj2x-aaap | https://httpd.apache.org/security/json/CVE-2011-4317.json | 34.0.0rc1 |
2024-01-04T01:33:31.044551+00:00 | Apache HTTPD Importer | Affected by | VCID-gjk7-z8g3-aaaq | https://httpd.apache.org/security/json/CVE-2011-3607.json | 34.0.0rc1 |
2024-01-04T01:33:30.515455+00:00 | Apache HTTPD Importer | Affected by | VCID-wyfa-5v5x-aaam | https://httpd.apache.org/security/json/CVE-2011-3368.json | 34.0.0rc1 |
2024-01-04T01:33:29.912735+00:00 | Apache HTTPD Importer | Affected by | VCID-29gg-v4hb-aaak | https://httpd.apache.org/security/json/CVE-2011-3192.json | 34.0.0rc1 |
2024-01-04T01:33:29.512958+00:00 | Apache HTTPD Importer | Affected by | VCID-w5ba-fmfs-aaam | https://httpd.apache.org/security/json/CVE-2011-0419.json | 34.0.0rc1 |
2024-01-04T01:33:29.335533+00:00 | Apache HTTPD Importer | Affected by | VCID-3fug-88kc-aaaa | https://httpd.apache.org/security/json/CVE-2010-2791.json | 34.0.0rc1 |
2024-01-04T01:33:29.278396+00:00 | Apache HTTPD Importer | Affected by | VCID-d59r-2grq-aaab | https://httpd.apache.org/security/json/CVE-2010-2068.json | 34.0.0rc1 |
2024-01-04T01:33:29.064221+00:00 | Apache HTTPD Importer | Affected by | VCID-rxf1-1k5a-aaam | https://httpd.apache.org/security/json/CVE-2010-1623.json | 34.0.0rc1 |
2024-01-04T01:33:28.709388+00:00 | Apache HTTPD Importer | Affected by | VCID-t9hu-6b2h-aaae | https://httpd.apache.org/security/json/CVE-2010-1452.json | 34.0.0rc1 |
2024-01-04T01:33:28.363770+00:00 | Apache HTTPD Importer | Affected by | VCID-a61m-1sk9-aaaj | https://httpd.apache.org/security/json/CVE-2010-0434.json | 34.0.0rc1 |
2024-01-04T01:33:28.024178+00:00 | Apache HTTPD Importer | Affected by | VCID-xfau-vqn8-aaah | https://httpd.apache.org/security/json/CVE-2010-0425.json | 34.0.0rc1 |
2024-01-04T01:33:27.837497+00:00 | Apache HTTPD Importer | Affected by | VCID-964c-4tbk-aaan | https://httpd.apache.org/security/json/CVE-2010-0408.json | 34.0.0rc1 |
2024-01-04T01:33:27.425311+00:00 | Apache HTTPD Importer | Affected by | VCID-c7e7-cdc7-aaam | https://httpd.apache.org/security/json/CVE-2009-3720.json | 34.0.0rc1 |
2024-01-04T01:33:27.053463+00:00 | Apache HTTPD Importer | Affected by | VCID-8dyd-depr-aaam | https://httpd.apache.org/security/json/CVE-2009-3560.json | 34.0.0rc1 |
2024-01-04T01:33:26.715484+00:00 | Apache HTTPD Importer | Affected by | VCID-dq5v-7ymd-aaaq | https://httpd.apache.org/security/json/CVE-2009-3095.json | 34.0.0rc1 |
2024-01-04T01:33:26.376995+00:00 | Apache HTTPD Importer | Affected by | VCID-z2dp-keth-aaan | https://httpd.apache.org/security/json/CVE-2009-3094.json | 34.0.0rc1 |
2024-01-04T01:33:26.185396+00:00 | Apache HTTPD Importer | Affected by | VCID-2tq2-wbv4-aaab | https://httpd.apache.org/security/json/CVE-2009-2699.json | 34.0.0rc1 |
2024-01-04T01:33:25.963490+00:00 | Apache HTTPD Importer | Affected by | VCID-us96-4dyu-aaad | https://httpd.apache.org/security/json/CVE-2009-2412.json | 34.0.0rc1 |
2024-01-04T01:33:25.784695+00:00 | Apache HTTPD Importer | Affected by | VCID-1sxy-v71c-aaah | https://httpd.apache.org/security/json/CVE-2009-1956.json | 34.0.0rc1 |
2024-01-04T01:33:25.716723+00:00 | Apache HTTPD Importer | Affected by | VCID-tepv-qzma-aaab | https://httpd.apache.org/security/json/CVE-2009-1955.json | 34.0.0rc1 |
2024-01-04T01:33:25.507748+00:00 | Apache HTTPD Importer | Affected by | VCID-p4wk-zcuh-aaad | https://httpd.apache.org/security/json/CVE-2009-1891.json | 34.0.0rc1 |
2024-01-04T01:33:25.330339+00:00 | Apache HTTPD Importer | Affected by | VCID-u4qv-snzv-aaaq | https://httpd.apache.org/security/json/CVE-2009-1890.json | 34.0.0rc1 |
2024-01-04T01:33:25.265984+00:00 | Apache HTTPD Importer | Affected by | VCID-u7ab-vxf1-aaak | https://httpd.apache.org/security/json/CVE-2009-1195.json | 34.0.0rc1 |
2024-01-04T01:33:25.180031+00:00 | Apache HTTPD Importer | Affected by | VCID-g44f-ek3a-aaak | https://httpd.apache.org/security/json/CVE-2009-0023.json | 34.0.0rc1 |
2024-01-04T01:33:24.990105+00:00 | Apache HTTPD Importer | Affected by | VCID-qhh5-wcj1-aaae | https://httpd.apache.org/security/json/CVE-2008-2939.json | 34.0.0rc1 |
2024-01-04T01:33:24.824756+00:00 | Apache HTTPD Importer | Fixing | VCID-j1rr-k9yr-aaae | https://httpd.apache.org/security/json/CVE-2008-2364.json | 34.0.0rc1 |
2024-01-04T01:33:24.514154+00:00 | Apache HTTPD Importer | Affected by | VCID-9khq-s81v-aaaf | https://httpd.apache.org/security/json/CVE-2008-0456.json | 34.0.0rc1 |
2024-01-04T01:33:24.089942+00:00 | Apache HTTPD Importer | Fixing | VCID-1b55-3v62-aaar | https://httpd.apache.org/security/json/CVE-2007-6420.json | 34.0.0rc1 |