Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/httpd@2.4.6-31.ael7b_1?arch=1 |
| Type | rpm |
| Namespace | redhat |
| Name | httpd |
| Version | 2.4.6-31.ael7b_1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-3wuk-hwg1-6fa6 |
| vulnerability_id |
VCID-3wuk-hwg1-6fa6 |
| summary |
A design error in the "ap_some_auth_required" function renders the API unusuable in httpd 2.4.x. In particular the API is documented to answering if the request required authentication but only answers if there are Require lines in the applicable configuration. Since 2.4.x Require lines are used for authorization as well and can appear in configurations even when no authentication is required and the request is entirely unrestricted. This could lead to modules using this API to allow access when they should otherwise not do so. API users should use the new ap_some_authn_required API added in 2.4.16 instead. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3185 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09491 |
| scoring_system |
epss |
| scoring_elements |
0.92802 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.09491 |
| scoring_system |
epss |
| scoring_elements |
0.92809 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.09491 |
| scoring_system |
epss |
| scoring_elements |
0.92814 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.09491 |
| scoring_system |
epss |
| scoring_elements |
0.92812 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.09491 |
| scoring_system |
epss |
| scoring_elements |
0.92821 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.09491 |
| scoring_system |
epss |
| scoring_elements |
0.92825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.09491 |
| scoring_system |
epss |
| scoring_elements |
0.92829 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.09491 |
| scoring_system |
epss |
| scoring_elements |
0.92839 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3185 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3185
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3wuk-hwg1-6fa6 |
|
| 1 |
| url |
VCID-k4kb-21tp-4kc8 |
| vulnerability_id |
VCID-k4kb-21tp-4kc8 |
| summary |
An HTTP request smuggling attack was possible due to a bug in parsing of chunked requests. A malicious client could force the server to misinterpret the request length, allowing cache poisoning or credential hijacking if an intermediary proxy is in use. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96477 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96485 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96489 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96494 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96505 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96508 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96511 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96517 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3183 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3183
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k4kb-21tp-4kc8 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 1.6 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd@2.4.6-31.ael7b_1%3Farch=1 |