Search for vulnerabilities
Vulnerability details: VCID-9ct1-1kcj-aaaa
Vulnerability ID VCID-9ct1-1kcj-aaaa
Aliases CVE-2003-0542
Summary Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.
Status Published
Exploitability 0.5
Weighted Severity 6.5
Risk 3.2
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual MODERATE http://marc.info/?l=bugtraq&m=130497311408250&w=2
rhas Low https://access.redhat.com/errata/RHSA-2004:015
epss 0.00080 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00080 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00080 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00080 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00406 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
epss 0.00591 https://api.first.org/data/v1/epss?cve=CVE-2003-0542
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1617048
apache_httpd low https://httpd.apache.org/security/json/CVE-2003-0542.json
cvssv2 7.2 https://nvd.nist.gov/vuln/detail/CVE-2003-0542
Reference id Reference type URL
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.6/SCOSA-2004.6.txt
ftp://patches.sgi.com/support/free/security/advisories/20031203-01-U.asc
ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc
http://docs.info.apple.com/article.html?artnum=61798
http://httpd.apache.org/dist/httpd/Announcement2.html
http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html
http://lists.apple.com/mhonarc/security-announce/msg00045.html
http://marc.info/?l=bugtraq&m=106761802305141&w=2
http://marc.info/?l=bugtraq&m=130497311408250&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0542.json
https://api.first.org/data/v1/epss?cve=CVE-2003-0542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0542
http://secunia.com/advisories/10096
http://secunia.com/advisories/10098
http://secunia.com/advisories/10102
http://secunia.com/advisories/10112
http://secunia.com/advisories/10114
http://secunia.com/advisories/10153
http://secunia.com/advisories/10260
http://secunia.com/advisories/10264
http://secunia.com/advisories/10463
http://secunia.com/advisories/10580
http://secunia.com/advisories/10593
https://exchange.xforce.ibmcloud.com/vulnerabilities/13400
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3799
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A863
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A864
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9458
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101444-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1
http://www.kb.cert.org/vuls/id/434566
http://www.kb.cert.org/vuls/id/549142
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:103
http://www.redhat.com/support/errata/RHSA-2003-320.html
http://www.redhat.com/support/errata/RHSA-2003-360.html
http://www.redhat.com/support/errata/RHSA-2003-405.html
http://www.redhat.com/support/errata/RHSA-2004-015.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
http://www.securityfocus.com/advisories/6079
http://www.securityfocus.com/archive/1/342674
http://www.securityfocus.com/bid/8911
http://www.securityfocus.com/bid/9504
1617048 https://bugzilla.redhat.com/show_bug.cgi?id=1617048
cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
CVE-2003-0542 https://httpd.apache.org/security/json/CVE-2003-0542.json
CVE-2003-0542 https://nvd.nist.gov/vuln/detail/CVE-2003-0542
RHSA-2003:320 https://access.redhat.com/errata/RHSA-2003:320
RHSA-2003:360 https://access.redhat.com/errata/RHSA-2003:360
RHSA-2003:405 https://access.redhat.com/errata/RHSA-2003:405
RHSA-2004:015 https://access.redhat.com/errata/RHSA-2004:015
RHSA-2004:139 https://access.redhat.com/errata/RHSA-2004:139
RHSA-2005:816 https://access.redhat.com/errata/RHSA-2005:816
No exploits are available.
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2003-0542
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.36206
EPSS Score 0.00080
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.