Search for vulnerabilities
Vulnerability details: VCID-q1pj-pmht-aaam
Vulnerability ID VCID-q1pj-pmht-aaam
Aliases CVE-2013-1896
Summary mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1207.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1208.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2013-1209.html
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1133
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1134
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1156
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1207
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1208
rhas Moderate https://access.redhat.com/errata/RHSA-2013:1209
epss 0.12233 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.12233 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.12233 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.13763 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.30654 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.33441 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.3438 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.3438 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.40444 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.43689 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.50482 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.50482 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.50482 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.50482 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.87483 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.87483 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.87483 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.92653 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.92653 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.92653 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.92653 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.92653 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.92653 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.92653 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
epss 0.92653 https://api.first.org/data/v1/epss?cve=CVE-2013-1896
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=983549
apache_httpd moderate https://httpd.apache.org/security/json/CVE-2013-1896.json
cvssv3.1 7.5 https://httpd.apache.org/security/vulnerabilities_24.html
generic_textual HIGH https://httpd.apache.org/security/vulnerabilities_24.html
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2013-1896
generic_textual MODERATE http://www-01.ibm.com/support/docview.wss?uid=swg21644047
Reference id Reference type URL
http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html
http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html
http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html
http://rhn.redhat.com/errata/RHSA-2013-1156.html
http://rhn.redhat.com/errata/RHSA-2013-1207.html
http://rhn.redhat.com/errata/RHSA-2013-1208.html
http://rhn.redhat.com/errata/RHSA-2013-1209.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1896.json
https://api.first.org/data/v1/epss?cve=CVE-2013-1896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
http://secunia.com/advisories/55032
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18835
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19747
http://support.apple.com/kb/HT6150
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?r1=1482522&r2=1485668&diff_format=h
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/mod_dav.c?view=log
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1896
http://www-01.ibm.com/support/docview.wss?uid=swg21644047
http://www.apache.org/dist/httpd/Announcement2.2.html
http://www.securityfocus.com/bid/61129
http://www.ubuntu.com/usn/USN-1903-1
717272 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717272
983549 https://bugzilla.redhat.com/show_bug.cgi?id=983549
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
CVE-2013-1896 https://httpd.apache.org/security/json/CVE-2013-1896.json
CVE-2013-1896 https://nvd.nist.gov/vuln/detail/CVE-2013-1896
GLSA-201309-12 https://security.gentoo.org/glsa/201309-12
RHSA-2013:1133 https://access.redhat.com/errata/RHSA-2013:1133
RHSA-2013:1134 https://access.redhat.com/errata/RHSA-2013:1134
RHSA-2013:1156 https://access.redhat.com/errata/RHSA-2013:1156
RHSA-2013:1207 https://access.redhat.com/errata/RHSA-2013:1207
RHSA-2013:1208 https://access.redhat.com/errata/RHSA-2013:1208
RHSA-2013:1209 https://access.redhat.com/errata/RHSA-2013:1209
USN-1903-1 https://usn.ubuntu.com/1903-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://httpd.apache.org/security/vulnerabilities_24.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-1896
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.93491
EPSS Score 0.12233
Published At May 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.