Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/497?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/497?format=api", "purl": "pkg:apache/httpd@1.3.41", "type": "apache", "namespace": "", "name": "httpd", "version": "1.3.41", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.0.65", "latest_non_vulnerable_version": "2.4.54", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3718?format=api", "vulnerability_id": "VCID-123w-f3zc-37d9", "summary": "An incorrect conversion between numeric types flaw was found in the mod_proxy module which affects some 64-bit architecture systems. A malicious HTTP server to which requests are being proxied could use this flaw to trigger a heap buffer overflow in an httpd child process via a carefully crafted response.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0010", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97698", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97677", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97684", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97685", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97689", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97692", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97695", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.47445", "scoring_system": "epss", "scoring_elements": "0.97697", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0010" }, { "reference_url": "https://httpd.apache.org/security/json/CVE-2010-0010.json", "reference_id": "CVE-2010-0010", "reference_type": "", "scores": [ { "value": "moderate", "scoring_system": "apache_httpd", "scoring_elements": "" } ], "url": "https://httpd.apache.org/security/json/CVE-2010-0010.json" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/510?format=api", "purl": "pkg:apache/httpd@1.3.42", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-prd8-51a5-pygj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.42" } ], "aliases": [ "CVE-2010-0010" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-123w-f3zc-37d9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3729?format=api", "vulnerability_id": "VCID-prd8-51a5-pygj", "summary": "An exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. No update of 1.3 will be released.\nPatches will be published to https://archive.apache.org/dist/httpd/patches/apply_to_1.3.42/", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.79136", "scoring_system": "epss", "scoring_elements": "0.99065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.79136", "scoring_system": "epss", "scoring_elements": "0.99054", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.79136", "scoring_system": "epss", "scoring_elements": "0.99055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.79136", "scoring_system": "epss", "scoring_elements": "0.99059", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.79136", "scoring_system": "epss", "scoring_elements": "0.99062", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.79136", "scoring_system": "epss", "scoring_elements": "0.99063", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.79136", "scoring_system": "epss", "scoring_elements": "0.99064", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=740045", "reference_id": "740045", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740045" }, { "reference_url": "https://httpd.apache.org/security/json/CVE-2011-3368.json", "reference_id": "CVE-2011-3368", "reference_type": "", "scores": [ { "value": "moderate", "scoring_system": "apache_httpd", "scoring_elements": "" } ], "url": "https://httpd.apache.org/security/json/CVE-2011-3368.json" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py", "reference_id": "CVE-2011-3368;OSVDB-76079", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/17969.py" }, { "reference_url": "https://security.gentoo.org/glsa/201206-25", "reference_id": "GLSA-201206-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1391", "reference_id": "RHSA-2011:1391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1392", "reference_id": "RHSA-2011:1392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0542", "reference_id": "RHSA-2012:0542", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0542" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0543", "reference_id": "RHSA-2012:0543", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0543" }, { "reference_url": "https://usn.ubuntu.com/1259-1/", "reference_id": "USN-1259-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1259-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/514?format=api", "purl": "pkg:apache/httpd@2.0.65", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.65" }, { "url": "http://public2.vulnerablecode.io/api/packages/518?format=api", "purl": "pkg:apache/httpd@2.2.22", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1189-ej89-hybs" }, { "vulnerability": "VCID-1bv2-mkj8-ubaz" }, { "vulnerability": "VCID-1d24-sy5z-jfhh" }, { "vulnerability": "VCID-1zk6-7wv2-ukcz" }, { "vulnerability": "VCID-2xc4-7zg9-y7fw" }, { "vulnerability": "VCID-5bej-9h7w-33c8" }, { "vulnerability": "VCID-6bez-sgg8-cbbq" }, { "vulnerability": "VCID-6pzx-1e5t-xbes" }, { "vulnerability": "VCID-8axm-4anr-27ht" }, { "vulnerability": "VCID-8gcm-7q3n-q7bm" }, { "vulnerability": "VCID-ese4-47tg-efbw" }, { "vulnerability": "VCID-fyrq-yg2u-jkc7" }, { "vulnerability": "VCID-jt89-ruvk-1kbj" }, { "vulnerability": "VCID-k4kb-21tp-4kc8" }, { "vulnerability": "VCID-ke1s-451y-p3cz" }, { "vulnerability": "VCID-kpew-rarv-83dg" }, { "vulnerability": "VCID-pc2n-ga7g-byga" }, { "vulnerability": "VCID-qayj-kts9-3fde" }, { "vulnerability": "VCID-rhk3-ujc1-q7fj" }, { "vulnerability": "VCID-ssvj-7g27-1ug6" }, { "vulnerability": "VCID-tbud-pwyt-aye9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.22" } ], "aliases": [ "CVE-2011-3368" ], "risk_score": 9.6, "exploitability": "2.0", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-prd8-51a5-pygj" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3696?format=api", "vulnerability_id": "VCID-dqkp-f1my-dbg9", "summary": "A flaw was found in the mod_imagemap module. On sites where mod_imagemap is enabled and an imagemap file is publicly available, a cross-site scripting attack is possible.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5000.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5000.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5000", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.7731", "scoring_system": "epss", "scoring_elements": "0.98975", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.7731", "scoring_system": "epss", "scoring_elements": "0.98968", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.7731", "scoring_system": "epss", "scoring_elements": "0.9897", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.7731", "scoring_system": "epss", "scoring_elements": "0.98972", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.78073", "scoring_system": "epss", "scoring_elements": "0.99015", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.78073", "scoring_system": "epss", "scoring_elements": "0.99012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.78073", "scoring_system": "epss", "scoring_elements": "0.99013", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.78073", "scoring_system": "epss", "scoring_elements": "0.99014", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931", "reference_id": "419931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931" }, { "reference_url": "https://httpd.apache.org/security/json/CVE-2007-5000.json", "reference_id": "CVE-2007-5000", "reference_type": "", "scores": [ { "value": "moderate", "scoring_system": "apache_httpd", "scoring_elements": "" } ], "url": "https://httpd.apache.org/security/json/CVE-2007-5000.json" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0004", "reference_id": "RHSA-2008:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0005", "reference_id": "RHSA-2008:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0006", "reference_id": "RHSA-2008:0006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0007", "reference_id": "RHSA-2008:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0008", "reference_id": "RHSA-2008:0008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0263", "reference_id": "RHSA-2008:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0523", "reference_id": "RHSA-2008:0523", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0523" }, { "reference_url": "https://usn.ubuntu.com/575-1/", "reference_id": "USN-575-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/575-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/497?format=api", "purl": "pkg:apache/httpd@1.3.41", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-123w-f3zc-37d9" }, { "vulnerability": "VCID-prd8-51a5-pygj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41" }, { "url": "http://public2.vulnerablecode.io/api/packages/498?format=api", "purl": "pkg:apache/httpd@2.0.63", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1bv2-mkj8-ubaz" }, { "vulnerability": "VCID-3cea-3rkm-r7gs" }, { "vulnerability": "VCID-4zzy-q5zp-jkgm" }, { "vulnerability": "VCID-56kt-8bg6-zbcj" }, { "vulnerability": "VCID-5yez-d5nj-q7eq" }, { "vulnerability": "VCID-6d43-sjqw-tbbp" }, { "vulnerability": "VCID-7krj-8vat-3ydy" }, { "vulnerability": "VCID-d4rc-pnv5-6uc8" }, { "vulnerability": "VCID-fn5k-e2jr-6ube" }, { "vulnerability": "VCID-g2pp-aahn-mfcd" }, { "vulnerability": "VCID-kkfv-4jd1-bqdm" }, { "vulnerability": "VCID-pdj3-4txb-vych" }, { "vulnerability": "VCID-prd8-51a5-pygj" }, { "vulnerability": "VCID-qtav-hqnd-b7fa" }, { "vulnerability": "VCID-umuk-3n1q-3qet" }, { "vulnerability": "VCID-wycq-jwzz-q7hf" }, { "vulnerability": "VCID-y8nd-7h3r-7fh5" }, { "vulnerability": "VCID-ym93-sxb8-fkdm" }, { "vulnerability": "VCID-zkbr-1m2z-ufe7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.63" }, { "url": "http://public2.vulnerablecode.io/api/packages/499?format=api", "purl": "pkg:apache/httpd@2.2.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1189-ej89-hybs" }, { "vulnerability": "VCID-1bv2-mkj8-ubaz" }, { "vulnerability": "VCID-1d24-sy5z-jfhh" }, { "vulnerability": "VCID-1zk6-7wv2-ukcz" }, { "vulnerability": "VCID-2xc4-7zg9-y7fw" }, { "vulnerability": "VCID-3cea-3rkm-r7gs" }, { "vulnerability": "VCID-3kyb-4yvt-f7e1" }, { "vulnerability": "VCID-4zzy-q5zp-jkgm" }, { "vulnerability": "VCID-56kt-8bg6-zbcj" }, { "vulnerability": "VCID-5bej-9h7w-33c8" }, { "vulnerability": "VCID-5yez-d5nj-q7eq" }, { "vulnerability": "VCID-6bez-sgg8-cbbq" }, { "vulnerability": "VCID-6d43-sjqw-tbbp" }, { "vulnerability": "VCID-6pzx-1e5t-xbes" }, { "vulnerability": "VCID-7ftk-sajb-akh4" }, { "vulnerability": "VCID-7krj-8vat-3ydy" }, { "vulnerability": "VCID-7s2y-pvar-qqe3" }, { "vulnerability": "VCID-8axm-4anr-27ht" }, { "vulnerability": "VCID-8gcm-7q3n-q7bm" }, { "vulnerability": "VCID-d4rc-pnv5-6uc8" }, { "vulnerability": "VCID-ese4-47tg-efbw" }, { "vulnerability": "VCID-fn5k-e2jr-6ube" }, { "vulnerability": "VCID-fyrq-yg2u-jkc7" }, { "vulnerability": "VCID-fysz-5mr6-fbf1" }, { "vulnerability": "VCID-g2pp-aahn-mfcd" }, { "vulnerability": "VCID-gu44-7hkr-muae" }, { "vulnerability": "VCID-hcjv-md55-3fcr" }, { "vulnerability": "VCID-jt89-ruvk-1kbj" }, { "vulnerability": "VCID-k4kb-21tp-4kc8" }, { "vulnerability": "VCID-ke1s-451y-p3cz" }, { "vulnerability": "VCID-kkfv-4jd1-bqdm" }, { "vulnerability": "VCID-kpew-rarv-83dg" }, { "vulnerability": "VCID-pc2n-ga7g-byga" }, { "vulnerability": "VCID-pdj3-4txb-vych" }, { "vulnerability": "VCID-pdtf-5zv7-2qaf" }, { "vulnerability": "VCID-pj4f-awuq-73g6" }, { "vulnerability": "VCID-prd8-51a5-pygj" }, { "vulnerability": "VCID-qayj-kts9-3fde" }, { "vulnerability": "VCID-qtav-hqnd-b7fa" }, { "vulnerability": "VCID-rhk3-ujc1-q7fj" }, { "vulnerability": "VCID-ssvj-7g27-1ug6" }, { "vulnerability": "VCID-svyk-az69-qbfw" }, { "vulnerability": "VCID-t95h-xhtm-zbdv" }, { "vulnerability": "VCID-tbud-pwyt-aye9" }, { "vulnerability": "VCID-umuk-3n1q-3qet" }, { "vulnerability": "VCID-wycq-jwzz-q7hf" }, { "vulnerability": "VCID-y8nd-7h3r-7fh5" }, { "vulnerability": "VCID-ym93-sxb8-fkdm" }, { "vulnerability": "VCID-zkbr-1m2z-ufe7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8" } ], "aliases": [ "CVE-2007-5000" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqkp-f1my-dbg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3697?format=api", "vulnerability_id": "VCID-kgpj-aexq-7kah", "summary": "A flaw was found in the mod_status module. On sites where mod_status is enabled and the status pages were publicly accessible, a cross-site scripting attack is possible. Note that the server-status page is not enabled by default and it is best practice to not make this publicly available.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6388.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6388.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6388", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.85047", "scoring_system": "epss", "scoring_elements": "0.99353", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.85047", "scoring_system": "epss", "scoring_elements": "0.99344", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.85047", "scoring_system": "epss", "scoring_elements": "0.99345", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.85047", "scoring_system": "epss", "scoring_elements": "0.99347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.85047", "scoring_system": "epss", "scoring_elements": "0.99348", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.85047", "scoring_system": "epss", "scoring_elements": "0.9935", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.85047", "scoring_system": "epss", "scoring_elements": "0.99352", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228", "reference_id": "427228", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228" }, { "reference_url": "https://httpd.apache.org/security/json/CVE-2007-6388.json", "reference_id": "CVE-2007-6388", "reference_type": "", "scores": [ { "value": "moderate", "scoring_system": "apache_httpd", "scoring_elements": "" } ], "url": "https://httpd.apache.org/security/json/CVE-2007-6388.json" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0004", "reference_id": "RHSA-2008:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0005", "reference_id": "RHSA-2008:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0006", "reference_id": "RHSA-2008:0006", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0007", "reference_id": "RHSA-2008:0007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0008", "reference_id": "RHSA-2008:0008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0263", "reference_id": "RHSA-2008:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0523", "reference_id": "RHSA-2008:0523", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0523" }, { "reference_url": "https://usn.ubuntu.com/575-1/", "reference_id": "USN-575-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/575-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/497?format=api", "purl": "pkg:apache/httpd@1.3.41", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-123w-f3zc-37d9" }, { "vulnerability": "VCID-prd8-51a5-pygj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41" }, { "url": "http://public2.vulnerablecode.io/api/packages/498?format=api", "purl": "pkg:apache/httpd@2.0.63", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1bv2-mkj8-ubaz" }, { "vulnerability": "VCID-3cea-3rkm-r7gs" }, { "vulnerability": "VCID-4zzy-q5zp-jkgm" }, { "vulnerability": "VCID-56kt-8bg6-zbcj" }, { "vulnerability": "VCID-5yez-d5nj-q7eq" }, { "vulnerability": "VCID-6d43-sjqw-tbbp" }, { "vulnerability": "VCID-7krj-8vat-3ydy" }, { "vulnerability": "VCID-d4rc-pnv5-6uc8" }, { "vulnerability": "VCID-fn5k-e2jr-6ube" }, { "vulnerability": "VCID-g2pp-aahn-mfcd" }, { "vulnerability": "VCID-kkfv-4jd1-bqdm" }, { "vulnerability": "VCID-pdj3-4txb-vych" }, { "vulnerability": "VCID-prd8-51a5-pygj" }, { "vulnerability": "VCID-qtav-hqnd-b7fa" }, { "vulnerability": "VCID-umuk-3n1q-3qet" }, { "vulnerability": "VCID-wycq-jwzz-q7hf" }, { "vulnerability": "VCID-y8nd-7h3r-7fh5" }, { "vulnerability": "VCID-ym93-sxb8-fkdm" }, { "vulnerability": "VCID-zkbr-1m2z-ufe7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.0.63" }, { "url": "http://public2.vulnerablecode.io/api/packages/499?format=api", "purl": "pkg:apache/httpd@2.2.8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1189-ej89-hybs" }, { "vulnerability": "VCID-1bv2-mkj8-ubaz" }, { "vulnerability": "VCID-1d24-sy5z-jfhh" }, { "vulnerability": "VCID-1zk6-7wv2-ukcz" }, { "vulnerability": "VCID-2xc4-7zg9-y7fw" }, { "vulnerability": "VCID-3cea-3rkm-r7gs" }, { "vulnerability": "VCID-3kyb-4yvt-f7e1" }, { "vulnerability": "VCID-4zzy-q5zp-jkgm" }, { "vulnerability": "VCID-56kt-8bg6-zbcj" }, { "vulnerability": "VCID-5bej-9h7w-33c8" }, { "vulnerability": "VCID-5yez-d5nj-q7eq" }, { "vulnerability": "VCID-6bez-sgg8-cbbq" }, { "vulnerability": "VCID-6d43-sjqw-tbbp" }, { "vulnerability": "VCID-6pzx-1e5t-xbes" }, { "vulnerability": "VCID-7ftk-sajb-akh4" }, { "vulnerability": "VCID-7krj-8vat-3ydy" }, { "vulnerability": "VCID-7s2y-pvar-qqe3" }, { "vulnerability": "VCID-8axm-4anr-27ht" }, { "vulnerability": "VCID-8gcm-7q3n-q7bm" }, { "vulnerability": "VCID-d4rc-pnv5-6uc8" }, { "vulnerability": "VCID-ese4-47tg-efbw" }, { "vulnerability": "VCID-fn5k-e2jr-6ube" }, { "vulnerability": "VCID-fyrq-yg2u-jkc7" }, { "vulnerability": "VCID-fysz-5mr6-fbf1" }, { "vulnerability": "VCID-g2pp-aahn-mfcd" }, { "vulnerability": "VCID-gu44-7hkr-muae" }, { "vulnerability": "VCID-hcjv-md55-3fcr" }, { "vulnerability": "VCID-jt89-ruvk-1kbj" }, { "vulnerability": "VCID-k4kb-21tp-4kc8" }, { "vulnerability": "VCID-ke1s-451y-p3cz" }, { "vulnerability": "VCID-kkfv-4jd1-bqdm" }, { "vulnerability": "VCID-kpew-rarv-83dg" }, { "vulnerability": "VCID-pc2n-ga7g-byga" }, { "vulnerability": "VCID-pdj3-4txb-vych" }, { "vulnerability": "VCID-pdtf-5zv7-2qaf" }, { "vulnerability": "VCID-pj4f-awuq-73g6" }, { "vulnerability": "VCID-prd8-51a5-pygj" }, { "vulnerability": "VCID-qayj-kts9-3fde" }, { "vulnerability": "VCID-qtav-hqnd-b7fa" }, { "vulnerability": "VCID-rhk3-ujc1-q7fj" }, { "vulnerability": "VCID-ssvj-7g27-1ug6" }, { "vulnerability": "VCID-svyk-az69-qbfw" }, { "vulnerability": "VCID-t95h-xhtm-zbdv" }, { "vulnerability": "VCID-tbud-pwyt-aye9" }, { "vulnerability": "VCID-umuk-3n1q-3qet" }, { "vulnerability": "VCID-wycq-jwzz-q7hf" }, { "vulnerability": "VCID-y8nd-7h3r-7fh5" }, { "vulnerability": "VCID-ym93-sxb8-fkdm" }, { "vulnerability": "VCID-zkbr-1m2z-ufe7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.2.8" } ], "aliases": [ "CVE-2007-6388" ], "risk_score": 9.6, "exploitability": "2.0", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kgpj-aexq-7kah" } ], "risk_score": "9.6", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@1.3.41" }