Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/mod_cluster-native@1.2.9-6.Final_redhat_2.ep6?arch=el5 |
| Type | rpm |
| Namespace | redhat |
| Name | mod_cluster-native |
| Version | 1.2.9-6.Final_redhat_2.ep6 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1d24-sy5z-jfhh |
| vulnerability_id |
VCID-1d24-sy5z-jfhh |
| summary |
HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. This fix adds the "MergeTrailers" directive to restore legacy behavior. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-5704 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.9846 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98446 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98448 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98451 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98453 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98457 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98458 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.64689 |
| scoring_system |
epss |
| scoring_elements |
0.98461 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-5704 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-5704
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1d24-sy5z-jfhh |
|
| 1 |
| url |
VCID-k4kb-21tp-4kc8 |
| vulnerability_id |
VCID-k4kb-21tp-4kc8 |
| summary |
An HTTP request smuggling attack was possible due to a bug in parsing of chunked requests. A malicious client could force the server to misinterpret the request length, allowing cache poisoning or credential hijacking if an intermediary proxy is in use. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96477 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96485 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96489 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96494 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96505 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96508 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.28343 |
| scoring_system |
epss |
| scoring_elements |
0.96511 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3183 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3183
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k4kb-21tp-4kc8 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 1.6 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mod_cluster-native@1.2.9-6.Final_redhat_2.ep6%3Farch=el5 |