Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2003-0987
mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.196
EPSS Ranking
95.1%
CVSS Severity
CVSS v2 Score
7.5
References
http://marc.info/?l=bugtraq&m=108437852004207&w=2
http://security.gentoo.org/glsa/glsa-200405-22.xml
http://securitytracker.com/id?1008920
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1
http://www.mail-archive.com/dev%40httpd.apache.org/msg19007.html
http://www.mail-archive.com/dev%40httpd.apache.org/msg19014.html
http://www.mandriva.com/security/advisories?name=MDKSA-2004:046
http://www.redhat.com/support/errata/RHSA-2004-600.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
http://www.securityfocus.com/bid/9571
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.529643
http://www.trustix.org/errata/2004/0027
https://exchange.xforce.ibmcloud.com/vulnerabilities/15041
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4416
http://marc.info/?l=bugtraq&m=108437852004207&w=2
http://security.gentoo.org/glsa/glsa-200405-22.xml
http://securitytracker.com/id?1008920
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1
http://www.mail-archive.com/dev%40httpd.apache.org/msg19007.html
http://www.mail-archive.com/dev%40httpd.apache.org/msg19014.html
http://www.mandriva.com/security/advisories?name=MDKSA-2004:046
http://www.redhat.com/support/errata/RHSA-2004-600.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
http://www.securityfocus.com/bid/9571
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.529643
http://www.trustix.org/errata/2004/0027
https://exchange.xforce.ibmcloud.com/vulnerabilities/15041
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4416
Products affected by CVE-2003-0987
Apache
»
Http Server
»
Version:
N/A
cpe:2.3:a:apache:http_server:-
Apache
»
Http Server
»
Version:
0.8.11
cpe:2.3:a:apache:http_server:0.8.11
Apache
»
Http Server
»
Version:
0.8.14
cpe:2.3:a:apache:http_server:0.8.14
Apache
»
Http Server
»
Version:
1.0
cpe:2.3:a:apache:http_server:1.0
Apache
»
Http Server
»
Version:
1.0.2
cpe:2.3:a:apache:http_server:1.0.2
Apache
»
Http Server
»
Version:
1.0.3
cpe:2.3:a:apache:http_server:1.0.3
Apache
»
Http Server
»
Version:
1.0.5
cpe:2.3:a:apache:http_server:1.0.5
Apache
»
Http Server
»
Version:
1.1
cpe:2.3:a:apache:http_server:1.1
Apache
»
Http Server
»
Version:
1.1.1
cpe:2.3:a:apache:http_server:1.1.1
Apache
»
Http Server
»
Version:
1.2
cpe:2.3:a:apache:http_server:1.2
Apache
»
Http Server
»
Version:
1.2.0
cpe:2.3:a:apache:http_server:1.2.0
Apache
»
Http Server
»
Version:
1.2.1
cpe:2.3:a:apache:http_server:1.2.1
Apache
»
Http Server
»
Version:
1.2.2
cpe:2.3:a:apache:http_server:1.2.2
Apache
»
Http Server
»
Version:
1.2.4
cpe:2.3:a:apache:http_server:1.2.4
Apache
»
Http Server
»
Version:
1.2.5
cpe:2.3:a:apache:http_server:1.2.5
Apache
»
Http Server
»
Version:
1.2.6
cpe:2.3:a:apache:http_server:1.2.6
Apache
»
Http Server
»
Version:
1.2.9
cpe:2.3:a:apache:http_server:1.2.9
Apache
»
Http Server
»
Version:
1.3
cpe:2.3:a:apache:http_server:1.3
Apache
»
Http Server
»
Version:
1.3.0
cpe:2.3:a:apache:http_server:1.3.0
Apache
»
Http Server
»
Version:
1.3.1
cpe:2.3:a:apache:http_server:1.3.1
Apache
»
Http Server
»
Version:
1.3.1.1
cpe:2.3:a:apache:http_server:1.3.1.1
Apache
»
Http Server
»
Version:
1.3.10
cpe:2.3:a:apache:http_server:1.3.10
Apache
»
Http Server
»
Version:
1.3.11
cpe:2.3:a:apache:http_server:1.3.11
Apache
»
Http Server
»
Version:
1.3.12
cpe:2.3:a:apache:http_server:1.3.12
Apache
»
Http Server
»
Version:
1.3.13
cpe:2.3:a:apache:http_server:1.3.13
Apache
»
Http Server
»
Version:
1.3.14
cpe:2.3:a:apache:http_server:1.3.14
Apache
»
Http Server
»
Version:
1.3.15
cpe:2.3:a:apache:http_server:1.3.15
Apache
»
Http Server
»
Version:
1.3.16
cpe:2.3:a:apache:http_server:1.3.16
Apache
»
Http Server
»
Version:
1.3.17
cpe:2.3:a:apache:http_server:1.3.17
Apache
»
Http Server
»
Version:
1.3.18
cpe:2.3:a:apache:http_server:1.3.18
Apache
»
Http Server
»
Version:
1.3.19
cpe:2.3:a:apache:http_server:1.3.19
Apache
»
Http Server
»
Version:
1.3.2
cpe:2.3:a:apache:http_server:1.3.2
Apache
»
Http Server
»
Version:
1.3.20
cpe:2.3:a:apache:http_server:1.3.20
Apache
»
Http Server
»
Version:
1.3.22
cpe:2.3:a:apache:http_server:1.3.22
Apache
»
Http Server
»
Version:
1.3.23
cpe:2.3:a:apache:http_server:1.3.23
Apache
»
Http Server
»
Version:
1.3.24
cpe:2.3:a:apache:http_server:1.3.24
Apache
»
Http Server
»
Version:
1.3.25
cpe:2.3:a:apache:http_server:1.3.25
Apache
»
Http Server
»
Version:
1.3.26
cpe:2.3:a:apache:http_server:1.3.26
Apache
»
Http Server
»
Version:
1.3.27
cpe:2.3:a:apache:http_server:1.3.27
Apache
»
Http Server
»
Version:
1.3.28
cpe:2.3:a:apache:http_server:1.3.28
Apache
»
Http Server
»
Version:
1.3.29
cpe:2.3:a:apache:http_server:1.3.29
Apache
»
Http Server
»
Version:
1.3.3
cpe:2.3:a:apache:http_server:1.3.3
Apache
»
Http Server
»
Version:
1.3.30
cpe:2.3:a:apache:http_server:1.3.30
Apache
»
Http Server
»
Version:
1.3.4
cpe:2.3:a:apache:http_server:1.3.4
Apache
»
Http Server
»
Version:
1.3.5
cpe:2.3:a:apache:http_server:1.3.5
Apache
»
Http Server
»
Version:
1.3.6
cpe:2.3:a:apache:http_server:1.3.6
Apache
»
Http Server
»
Version:
1.3.7
cpe:2.3:a:apache:http_server:1.3.7
Apache
»
Http Server
»
Version:
1.3.8
cpe:2.3:a:apache:http_server:1.3.8
Apache
»
Http Server
»
Version:
1.3.9
cpe:2.3:a:apache:http_server:1.3.9
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved