Search for vulnerabilities
Vulnerability details: VCID-t9hu-6b2h-aaae
Vulnerability ID VCID-t9hu-6b2h-aaae
Aliases CVE-2010-1452
Summary The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0659
rhas Moderate https://access.redhat.com/errata/RHSA-2011:0896
rhas Moderate https://access.redhat.com/errata/RHSA-2011:0897
epss 0.19501 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.19501 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.19501 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.19501 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.19501 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20042 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20042 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20042 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20042 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20042 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20042 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20302 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20302 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20302 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20302 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.20302 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.22992 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.23722 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.28726 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.28726 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.28726 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.30517 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.30517 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
epss 0.30517 https://api.first.org/data/v1/epss?cve=CVE-2010-1452
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=618189
apache_httpd low https://httpd.apache.org/security/json/CVE-2010-1452.json
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2010-1452
Reference id Reference type URL
http://blogs.sun.com/security/entry/cve_2010_1452_mod_dav
http://httpd.apache.org/security/vulnerabilities_22.html
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html
http://marc.info/?l=apache-announce&m=128009718610929&w=2
http://marc.info/?l=bugtraq&m=129190899612998&w=2
http://marc.info/?l=bugtraq&m=133355494609819&w=2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1452.json
https://api.first.org/data/v1/epss?cve=CVE-2010-1452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
http://secunia.com/advisories/42367
https://issues.apache.org/bugzilla/show_bug.cgi?id=49246
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.467395
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11683
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12341
http://support.apple.com/kb/HT4581
http://ubuntu.com/usn/usn-1021-1
http://www.redhat.com/support/errata/RHSA-2010-0659.html
http://www.redhat.com/support/errata/RHSA-2011-0896.html
http://www.redhat.com/support/errata/RHSA-2011-0897.html
http://www.vupen.com/english/advisories/2010/2218
http://www.vupen.com/english/advisories/2010/3064
http://www.vupen.com/english/advisories/2011/0291
618189 https://bugzilla.redhat.com/show_bug.cgi?id=618189
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
CVE-2010-1452 https://httpd.apache.org/security/json/CVE-2010-1452.json
CVE-2010-1452 https://nvd.nist.gov/vuln/detail/CVE-2010-1452
GLSA-201206-25 https://security.gentoo.org/glsa/201206-25
RHSA-2010:0659 https://access.redhat.com/errata/RHSA-2010:0659
RHSA-2011:0896 https://access.redhat.com/errata/RHSA-2011:0896
RHSA-2011:0897 https://access.redhat.com/errata/RHSA-2011:0897
USN-1021-1 https://usn.ubuntu.com/1021-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2010-1452
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.9508
EPSS Score 0.19501
Published At June 13, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.