Search for vulnerabilities
Vulnerability details: VCID-y6c7-dj1n-aaas
Vulnerability ID VCID-y6c7-dj1n-aaas
Aliases CVE-2007-1863
Summary cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
Status Published
Exploitability 2.0
Weighted Severity 6.2
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
generic_textual LOW http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0533
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0534
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0556
rhas Moderate https://access.redhat.com/errata/RHSA-2007:0557
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0602
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.30391 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.43036 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.85682 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.85682 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.85682 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.85682 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.85682 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.85682 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.85682 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.85682 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.88128 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.89412 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
epss 0.89412 https://api.first.org/data/v1/epss?cve=CVE-2007-1863
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=244658
apache_httpd moderate https://httpd.apache.org/security/json/CVE-2007-1863.json
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2007-1863
Reference id Reference type URL
http://bugs.gentoo.org/show_bug.cgi?id=186219
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
http://httpd.apache.org/security/vulnerabilities_20.html
http://httpd.apache.org/security/vulnerabilities_22.html
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
http://lists.vmware.com/pipermail/security-announce/2009/000062.html
http://osvdb.org/37079
http://rhn.redhat.com/errata/RHSA-2007-0534.html
http://rhn.redhat.com/errata/RHSA-2007-0556.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1863.json
https://api.first.org/data/v1/epss?cve=CVE-2007-1863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863
http://secunia.com/advisories/25830
http://secunia.com/advisories/25873
http://secunia.com/advisories/25920
http://secunia.com/advisories/26273
http://secunia.com/advisories/26443
http://secunia.com/advisories/26508
http://secunia.com/advisories/26822
http://secunia.com/advisories/26842
http://secunia.com/advisories/26993
http://secunia.com/advisories/27037
http://secunia.com/advisories/27563
http://secunia.com/advisories/27732
http://secunia.com/advisories/28606
http://secunia.com/advisories/30430
http://security.gentoo.org/glsa/glsa-200711-06.xml
https://issues.rpath.com/browse/RPL-1500
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9824
https://rhn.redhat.com/errata/RHSA-2007-0533.html
http://support.avaya.com/elmodocs2/security/ASA-2007-353.htm
http://svn.apache.org/viewvc?view=rev&revision=535617
http://www-1.ibm.com/support/docview.wss?uid=swg1PK49355
http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
http://www.mandriva.com/security/advisories?name=MDKSA-2007:141
http://www.novell.com/linux/security/advisories/2007_61_apache2.html
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
http://www.redhat.com/support/errata/RHSA-2007-0557.html
http://www.securityfocus.com/archive/1/505990/100/0/threaded
http://www.securityfocus.com/bid/24649
http://www.securitytracker.com/id?1018303
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-499-1
http://www.us-cert.gov/cas/techalerts/TA08-150A.html
http://www.vupen.com/english/advisories/2007/2727
http://www.vupen.com/english/advisories/2007/3283
http://www.vupen.com/english/advisories/2007/3386
http://www.vupen.com/english/advisories/2008/0233
http://www.vupen.com/english/advisories/2008/1697
244658 https://bugzilla.redhat.com/show_bug.cgi?id=244658
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*
CVE-2007-1863 https://httpd.apache.org/security/json/CVE-2007-1863.json
CVE-2007-1863 https://nvd.nist.gov/vuln/detail/CVE-2007-1863
GLSA-200711-06 https://security.gentoo.org/glsa/200711-06
RHSA-2007:0533 https://access.redhat.com/errata/RHSA-2007:0533
RHSA-2007:0534 https://access.redhat.com/errata/RHSA-2007:0534
RHSA-2007:0556 https://access.redhat.com/errata/RHSA-2007:0556
RHSA-2007:0557 https://access.redhat.com/errata/RHSA-2007:0557
RHSA-2010:0602 https://access.redhat.com/errata/RHSA-2010:0602
USN-499-1 https://usn.ubuntu.com/499-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2007-1863
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.96293
EPSS Score 0.30391
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.