Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/httpd22@2.2.10-23.1.ep5?arch=el4
Typerpm
Namespaceredhat
Namehttpd22
Version2.2.10-23.1.ep5
Qualifiers
arch el4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3kyb-4yvt-f7e1
vulnerability_id VCID-3kyb-4yvt-f7e1
summary A denial of service flaw was found in the bundled copy of the APR-util library Extensible Markup Language (XML) parser. A remote attacker could create a specially-crafted XML document that would cause excessive memory consumption when processed by the XML decoding engine.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1955.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1955.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1955
reference_id
reference_type
scores
0
value 0.02329
scoring_system epss
scoring_elements 0.84845
published_at 2026-04-21T12:55:00Z
1
value 0.02329
scoring_system epss
scoring_elements 0.8475
published_at 2026-04-01T12:55:00Z
2
value 0.02329
scoring_system epss
scoring_elements 0.84765
published_at 2026-04-02T12:55:00Z
3
value 0.02329
scoring_system epss
scoring_elements 0.84784
published_at 2026-04-04T12:55:00Z
4
value 0.02329
scoring_system epss
scoring_elements 0.84785
published_at 2026-04-07T12:55:00Z
5
value 0.02329
scoring_system epss
scoring_elements 0.84808
published_at 2026-04-08T12:55:00Z
6
value 0.02329
scoring_system epss
scoring_elements 0.84814
published_at 2026-04-09T12:55:00Z
7
value 0.02329
scoring_system epss
scoring_elements 0.84833
published_at 2026-04-11T12:55:00Z
8
value 0.02329
scoring_system epss
scoring_elements 0.84829
published_at 2026-04-12T12:55:00Z
9
value 0.02329
scoring_system epss
scoring_elements 0.84824
published_at 2026-04-13T12:55:00Z
10
value 0.02329
scoring_system epss
scoring_elements 0.84846
published_at 2026-04-16T12:55:00Z
11
value 0.02329
scoring_system epss
scoring_elements 0.84847
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1955
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=504555
reference_id 504555
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=504555
4
reference_url https://httpd.apache.org/security/json/CVE-2009-1955.json
reference_id CVE-2009-1955
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-1955.json
5
reference_url https://security.gentoo.org/glsa/200907-03
reference_id GLSA-200907-03
reference_type
scores
url https://security.gentoo.org/glsa/200907-03
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/8842.pl
reference_id OSVDB-55057;CVE-2009-1955
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/8842.pl
7
reference_url https://access.redhat.com/errata/RHSA-2009:1107
reference_id RHSA-2009:1107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1107
8
reference_url https://access.redhat.com/errata/RHSA-2009:1108
reference_id RHSA-2009:1108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1108
9
reference_url https://access.redhat.com/errata/RHSA-2009:1160
reference_id RHSA-2009:1160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1160
10
reference_url https://usn.ubuntu.com/786-1/
reference_id USN-786-1
reference_type
scores
url https://usn.ubuntu.com/786-1/
11
reference_url https://usn.ubuntu.com/787-1/
reference_id USN-787-1
reference_type
scores
url https://usn.ubuntu.com/787-1/
fixed_packages
aliases CVE-2009-1955
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3kyb-4yvt-f7e1
1
url VCID-7ftk-sajb-akh4
vulnerability_id VCID-7ftk-sajb-akh4
summary A heap-based underwrite flaw was found in the way the bundled copy of the APR-util library created compiled forms of particular search patterns. An attacker could formulate a specially-crafted search keyword, that would overwrite arbitrary heap memory locations when processed by the pattern preparation engine.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0023.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0023
reference_id
reference_type
scores
0
value 0.14793
scoring_system epss
scoring_elements 0.94526
published_at 2026-04-21T12:55:00Z
1
value 0.14793
scoring_system epss
scoring_elements 0.94469
published_at 2026-04-01T12:55:00Z
2
value 0.14793
scoring_system epss
scoring_elements 0.94476
published_at 2026-04-02T12:55:00Z
3
value 0.14793
scoring_system epss
scoring_elements 0.94483
published_at 2026-04-04T12:55:00Z
4
value 0.14793
scoring_system epss
scoring_elements 0.94485
published_at 2026-04-07T12:55:00Z
5
value 0.14793
scoring_system epss
scoring_elements 0.94495
published_at 2026-04-08T12:55:00Z
6
value 0.14793
scoring_system epss
scoring_elements 0.94499
published_at 2026-04-09T12:55:00Z
7
value 0.14793
scoring_system epss
scoring_elements 0.94502
published_at 2026-04-11T12:55:00Z
8
value 0.14793
scoring_system epss
scoring_elements 0.94504
published_at 2026-04-13T12:55:00Z
9
value 0.14793
scoring_system epss
scoring_elements 0.94517
published_at 2026-04-16T12:55:00Z
10
value 0.14793
scoring_system epss
scoring_elements 0.94522
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=503928
reference_id 503928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=503928
4
reference_url https://httpd.apache.org/security/json/CVE-2009-0023.json
reference_id CVE-2009-0023
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-0023.json
5
reference_url https://security.gentoo.org/glsa/200907-03
reference_id GLSA-200907-03
reference_type
scores
url https://security.gentoo.org/glsa/200907-03
6
reference_url https://access.redhat.com/errata/RHSA-2009:1107
reference_id RHSA-2009:1107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1107
7
reference_url https://access.redhat.com/errata/RHSA-2009:1108
reference_id RHSA-2009:1108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1108
8
reference_url https://access.redhat.com/errata/RHSA-2009:1160
reference_id RHSA-2009:1160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1160
9
reference_url https://usn.ubuntu.com/786-1/
reference_id USN-786-1
reference_type
scores
url https://usn.ubuntu.com/786-1/
10
reference_url https://usn.ubuntu.com/787-1/
reference_id USN-787-1
reference_type
scores
url https://usn.ubuntu.com/787-1/
fixed_packages
aliases CVE-2009-0023
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ftk-sajb-akh4
2
url VCID-fysz-5mr6-fbf1
vulnerability_id VCID-fysz-5mr6-fbf1
summary A denial of service flaw was found in the mod_proxy module when it was used as a reverse proxy. A remote attacker could use this flaw to force a proxy process to consume large amounts of CPU time.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1890.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1890
reference_id
reference_type
scores
0
value 0.3787
scoring_system epss
scoring_elements 0.97221
published_at 2026-04-21T12:55:00Z
1
value 0.3787
scoring_system epss
scoring_elements 0.9718
published_at 2026-04-01T12:55:00Z
2
value 0.3787
scoring_system epss
scoring_elements 0.97186
published_at 2026-04-02T12:55:00Z
3
value 0.3787
scoring_system epss
scoring_elements 0.97192
published_at 2026-04-04T12:55:00Z
4
value 0.3787
scoring_system epss
scoring_elements 0.97193
published_at 2026-04-07T12:55:00Z
5
value 0.3787
scoring_system epss
scoring_elements 0.97202
published_at 2026-04-08T12:55:00Z
6
value 0.3787
scoring_system epss
scoring_elements 0.97204
published_at 2026-04-09T12:55:00Z
7
value 0.3787
scoring_system epss
scoring_elements 0.97207
published_at 2026-04-11T12:55:00Z
8
value 0.3787
scoring_system epss
scoring_elements 0.97208
published_at 2026-04-13T12:55:00Z
9
value 0.3787
scoring_system epss
scoring_elements 0.97216
published_at 2026-04-16T12:55:00Z
10
value 0.3787
scoring_system epss
scoring_elements 0.97218
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=509375
reference_id 509375
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=509375
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536718
reference_id 536718
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=536718
5
reference_url https://httpd.apache.org/security/json/CVE-2009-1890.json
reference_id CVE-2009-1890
reference_type
scores
0
value important
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-1890.json
6
reference_url https://security.gentoo.org/glsa/200907-04
reference_id GLSA-200907-04
reference_type
scores
url https://security.gentoo.org/glsa/200907-04
7
reference_url https://access.redhat.com/errata/RHSA-2009:1148
reference_id RHSA-2009:1148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1148
8
reference_url https://access.redhat.com/errata/RHSA-2009:1155
reference_id RHSA-2009:1155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1155
9
reference_url https://access.redhat.com/errata/RHSA-2009:1160
reference_id RHSA-2009:1160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1160
10
reference_url https://usn.ubuntu.com/802-1/
reference_id USN-802-1
reference_type
scores
url https://usn.ubuntu.com/802-1/
fixed_packages
aliases CVE-2009-1890
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fysz-5mr6-fbf1
3
url VCID-pdj3-4txb-vych
vulnerability_id VCID-pdj3-4txb-vych
summary A denial of service flaw was found in the mod_deflate module. This module continued to compress large files until compression was complete, even if the network connection that requested the content was closed before compression completed. This would cause mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1891.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1891
reference_id
reference_type
scores
0
value 0.18846
scoring_system epss
scoring_elements 0.95315
published_at 2026-04-21T12:55:00Z
1
value 0.18846
scoring_system epss
scoring_elements 0.9526
published_at 2026-04-01T12:55:00Z
2
value 0.18846
scoring_system epss
scoring_elements 0.95272
published_at 2026-04-02T12:55:00Z
3
value 0.18846
scoring_system epss
scoring_elements 0.95278
published_at 2026-04-04T12:55:00Z
4
value 0.18846
scoring_system epss
scoring_elements 0.95283
published_at 2026-04-07T12:55:00Z
5
value 0.18846
scoring_system epss
scoring_elements 0.95291
published_at 2026-04-08T12:55:00Z
6
value 0.18846
scoring_system epss
scoring_elements 0.95293
published_at 2026-04-09T12:55:00Z
7
value 0.18846
scoring_system epss
scoring_elements 0.95298
published_at 2026-04-11T12:55:00Z
8
value 0.18846
scoring_system epss
scoring_elements 0.95299
published_at 2026-04-12T12:55:00Z
9
value 0.18846
scoring_system epss
scoring_elements 0.95301
published_at 2026-04-13T12:55:00Z
10
value 0.18846
scoring_system epss
scoring_elements 0.95308
published_at 2026-04-16T12:55:00Z
11
value 0.18846
scoring_system epss
scoring_elements 0.95312
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1891
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=509125
reference_id 509125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=509125
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712
reference_id 534712
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712
5
reference_url https://httpd.apache.org/security/json/CVE-2009-1891.json
reference_id CVE-2009-1891
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-1891.json
6
reference_url https://security.gentoo.org/glsa/200907-04
reference_id GLSA-200907-04
reference_type
scores
url https://security.gentoo.org/glsa/200907-04
7
reference_url https://access.redhat.com/errata/RHSA-2009:1148
reference_id RHSA-2009:1148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1148
8
reference_url https://access.redhat.com/errata/RHSA-2009:1155
reference_id RHSA-2009:1155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1155
9
reference_url https://access.redhat.com/errata/RHSA-2009:1160
reference_id RHSA-2009:1160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1160
10
reference_url https://access.redhat.com/errata/RHSA-2009:1205
reference_id RHSA-2009:1205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1205
11
reference_url https://usn.ubuntu.com/802-1/
reference_id USN-802-1
reference_type
scores
url https://usn.ubuntu.com/802-1/
fixed_packages
aliases CVE-2009-1891
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdj3-4txb-vych
4
url VCID-t95h-xhtm-zbdv
vulnerability_id VCID-t95h-xhtm-zbdv
summary A flaw was found in the handling of the "Options" and "AllowOverride" directives. In configurations using the "AllowOverride" directive with certain "Options=" arguments, local users were not restricted from executing commands from a Server-Side-Include script as intended.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1195.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1195
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40672
published_at 2026-04-21T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40677
published_at 2026-04-01T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.4076
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40788
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40712
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40762
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40769
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40754
published_at 2026-04-12T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40735
published_at 2026-04-13T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40779
published_at 2026-04-16T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=489436
reference_id 489436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=489436
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530834
reference_id 530834
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530834
5
reference_url https://httpd.apache.org/security/json/CVE-2009-1195.json
reference_id CVE-2009-1195
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-1195.json
6
reference_url https://security.gentoo.org/glsa/200907-04
reference_id GLSA-200907-04
reference_type
scores
url https://security.gentoo.org/glsa/200907-04
7
reference_url https://access.redhat.com/errata/RHSA-2009:1075
reference_id RHSA-2009:1075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1075
8
reference_url https://access.redhat.com/errata/RHSA-2009:1155
reference_id RHSA-2009:1155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1155
9
reference_url https://access.redhat.com/errata/RHSA-2009:1160
reference_id RHSA-2009:1160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1160
10
reference_url https://usn.ubuntu.com/787-1/
reference_id USN-787-1
reference_type
scores
url https://usn.ubuntu.com/787-1/
fixed_packages
aliases CVE-2009-1195
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t95h-xhtm-zbdv
Fixing_vulnerabilities
Risk_score9.6
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd22@2.2.10-23.1.ep5%3Farch=el4