Search for vulnerabilities
Vulnerability details: VCID-xqb8-4zzf-aaae
Vulnerability ID VCID-xqb8-4zzf-aaae
Aliases CVE-2014-0231
Summary The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://httpd.apache.org/security/vulnerabilities_24.html
generic_textual MODERATE http://marc.info/?l=bugtraq&m=143403519711434&w=2
generic_textual LOW http://marc.info/?l=bugtraq&m=144050155601375&w=2
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0231.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2014-1019.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2014-1020.html
generic_textual MODERATE http://rhn.redhat.com/errata/RHSA-2014-1021.html
rhas Important https://access.redhat.com/errata/RHSA-2014:0920
rhas Important https://access.redhat.com/errata/RHSA-2014:0921
rhas Important https://access.redhat.com/errata/RHSA-2014:0922
rhas Important https://access.redhat.com/errata/RHSA-2014:1019
rhas Important https://access.redhat.com/errata/RHSA-2014:1020
rhas Important https://access.redhat.com/errata/RHSA-2014:1021
rhas Important https://access.redhat.com/errata/RHSA-2014:1086
rhas Important https://access.redhat.com/errata/RHSA-2014:1087
rhas Important https://access.redhat.com/errata/RHSA-2014:1088
epss 0.15654 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.15654 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.15654 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.15654 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.15654 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.15654 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.15654 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.16023 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.16023 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.16023 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.19475 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.19475 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.19475 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.19475 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.19475 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.19705 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.24715 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.25791 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.2872 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.29332 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.42254 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.42254 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.42254 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
epss 0.42254 https://api.first.org/data/v1/epss?cve=CVE-2014-0231
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
apache_httpd important https://httpd.apache.org/security/json/CVE-2014-0231.json
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2014-0231
generic_textual Medium https://ubuntu.com/security/notices/USN-2299-1
generic_textual Low http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
cvssv3.1 5.3 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Reference id Reference type URL
http://advisories.mageia.org/MGASA-2014-0304.html
http://advisories.mageia.org/MGASA-2014-0305.html
http://httpd.apache.org/security/vulnerabilities_24.html
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
http://marc.info/?l=bugtraq&m=143403519711434&w=2
http://marc.info/?l=bugtraq&m=143748090628601&w=2
http://marc.info/?l=bugtraq&m=144050155601375&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0231.html
http://rhn.redhat.com/errata/RHSA-2014-1019.html
http://rhn.redhat.com/errata/RHSA-2014-1020.html
http://rhn.redhat.com/errata/RHSA-2014-1021.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0231.json
https://api.first.org/data/v1/epss?cve=CVE-2014-0231
https://bugzilla.redhat.com/show_bug.cgi?id=1120596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231
http://secunia.com/advisories/60536
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E
https://puppet.com/security/cve/cve-2014-0231
https://security.gentoo.org/glsa/201504-03
https://support.apple.com/HT204659
https://ubuntu.com/security/notices/USN-2299-1
http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1482522&r2=1535125&diff_format=h
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1565711&r2=1610509&diff_format=h
http://www.debian.org/security/2014/dsa-2989
http://www.mandriva.com/security/advisories?name=MDVSA-2014:142
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.securityfocus.com/bid/68742
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.26:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.27:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*
CVE-2014-0231 https://httpd.apache.org/security/json/CVE-2014-0231.json
CVE-2014-0231 https://nvd.nist.gov/vuln/detail/CVE-2014-0231
RHSA-2014:0920 https://access.redhat.com/errata/RHSA-2014:0920
RHSA-2014:0921 https://access.redhat.com/errata/RHSA-2014:0921
RHSA-2014:0922 https://access.redhat.com/errata/RHSA-2014:0922
RHSA-2014:1019 https://access.redhat.com/errata/RHSA-2014:1019
RHSA-2014:1020 https://access.redhat.com/errata/RHSA-2014:1020
RHSA-2014:1021 https://access.redhat.com/errata/RHSA-2014:1021
RHSA-2014:1086 https://access.redhat.com/errata/RHSA-2014:1086
RHSA-2014:1087 https://access.redhat.com/errata/RHSA-2014:1087
RHSA-2014:1088 https://access.redhat.com/errata/RHSA-2014:1088
USN-2299-1 https://usn.ubuntu.com/2299-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2014-0231
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.94149
EPSS Score 0.15654
Published At April 4, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.