Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/httpd@2.4.51-7.el9_0?arch=7
Typerpm
Namespaceredhat
Namehttpd
Version2.4.51-7.el9_0
Qualifiers
arch 7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-8edq-8rvq-rkf1
vulnerability_id VCID-8edq-8rvq-rkf1
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38475.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38475.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38475
reference_id
reference_type
scores
0
value 0.93858
scoring_system epss
scoring_elements 0.99869
published_at 2026-04-13T12:55:00Z
1
value 0.93858
scoring_system epss
scoring_elements 0.99867
published_at 2026-04-09T12:55:00Z
2
value 0.93858
scoring_system epss
scoring_elements 0.99868
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38475
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295014
reference_id 2295014
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295014
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38475.json
reference_id CVE-2024-38475
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38475.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-05-02T03:55:18Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:4719
reference_id RHSA-2024:4719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4719
15
reference_url https://access.redhat.com/errata/RHSA-2024:4720
reference_id RHSA-2024:4720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4720
16
reference_url https://access.redhat.com/errata/RHSA-2024:4726
reference_id RHSA-2024:4726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4726
17
reference_url https://access.redhat.com/errata/RHSA-2024:4820
reference_id RHSA-2024:4820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4820
18
reference_url https://access.redhat.com/errata/RHSA-2024:4827
reference_id RHSA-2024:4827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4827
19
reference_url https://access.redhat.com/errata/RHSA-2024:4830
reference_id RHSA-2024:4830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4830
20
reference_url https://access.redhat.com/errata/RHSA-2024:4862
reference_id RHSA-2024:4862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4862
21
reference_url https://access.redhat.com/errata/RHSA-2024:4863
reference_id RHSA-2024:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4863
22
reference_url https://access.redhat.com/errata/RHSA-2024:4938
reference_id RHSA-2024:4938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4938
23
reference_url https://access.redhat.com/errata/RHSA-2024:4943
reference_id RHSA-2024:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4943
24
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
25
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
26
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
27
reference_url https://usn.ubuntu.com/6885-3/
reference_id USN-6885-3
reference_type
scores
url https://usn.ubuntu.com/6885-3/
28
reference_url https://usn.ubuntu.com/6885-5/
reference_id USN-6885-5
reference_type
scores
url https://usn.ubuntu.com/6885-5/
fixed_packages
aliases CVE-2024-38475
risk_score 10.0
exploitability 2.0
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8edq-8rvq-rkf1
1
url VCID-ej7y-7na3-5qby
vulnerability_id VCID-ej7y-7na3-5qby
summary
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in
directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38474.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38474.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38474
reference_id
reference_type
scores
0
value 0.00744
scoring_system epss
scoring_elements 0.73027
published_at 2026-04-13T12:55:00Z
1
value 0.00744
scoring_system epss
scoring_elements 0.72979
published_at 2026-04-07T12:55:00Z
2
value 0.00744
scoring_system epss
scoring_elements 0.73016
published_at 2026-04-08T12:55:00Z
3
value 0.00744
scoring_system epss
scoring_elements 0.7303
published_at 2026-04-09T12:55:00Z
4
value 0.00744
scoring_system epss
scoring_elements 0.73055
published_at 2026-04-11T12:55:00Z
5
value 0.00744
scoring_system epss
scoring_elements 0.73034
published_at 2026-04-12T12:55:00Z
6
value 0.00744
scoring_system epss
scoring_elements 0.72983
published_at 2026-04-02T12:55:00Z
7
value 0.00744
scoring_system epss
scoring_elements 0.73003
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38474
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295013
reference_id 2295013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295013
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38474.json
reference_id CVE-2024-38474
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38474.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T18:02:41Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:4719
reference_id RHSA-2024:4719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4719
15
reference_url https://access.redhat.com/errata/RHSA-2024:4720
reference_id RHSA-2024:4720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4720
16
reference_url https://access.redhat.com/errata/RHSA-2024:4726
reference_id RHSA-2024:4726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4726
17
reference_url https://access.redhat.com/errata/RHSA-2024:4820
reference_id RHSA-2024:4820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4820
18
reference_url https://access.redhat.com/errata/RHSA-2024:4827
reference_id RHSA-2024:4827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4827
19
reference_url https://access.redhat.com/errata/RHSA-2024:4830
reference_id RHSA-2024:4830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4830
20
reference_url https://access.redhat.com/errata/RHSA-2024:4862
reference_id RHSA-2024:4862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4862
21
reference_url https://access.redhat.com/errata/RHSA-2024:4863
reference_id RHSA-2024:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4863
22
reference_url https://access.redhat.com/errata/RHSA-2024:4938
reference_id RHSA-2024:4938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4938
23
reference_url https://access.redhat.com/errata/RHSA-2024:4943
reference_id RHSA-2024:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4943
24
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
25
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
26
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
27
reference_url https://usn.ubuntu.com/6885-3/
reference_id USN-6885-3
reference_type
scores
url https://usn.ubuntu.com/6885-3/
28
reference_url https://usn.ubuntu.com/6885-5/
reference_id USN-6885-5
reference_type
scores
url https://usn.ubuntu.com/6885-5/
fixed_packages
aliases CVE-2024-38474
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej7y-7na3-5qby
2
url VCID-pjxs-hnjr-duey
vulnerability_id VCID-pjxs-hnjr-duey
summary
null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38477.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38477.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38477
reference_id
reference_type
scores
0
value 0.01148
scoring_system epss
scoring_elements 0.78479
published_at 2026-04-12T12:55:00Z
1
value 0.01148
scoring_system epss
scoring_elements 0.78472
published_at 2026-04-13T12:55:00Z
2
value 0.01148
scoring_system epss
scoring_elements 0.78498
published_at 2026-04-11T12:55:00Z
3
value 0.01347
scoring_system epss
scoring_elements 0.80057
published_at 2026-04-04T12:55:00Z
4
value 0.01347
scoring_system epss
scoring_elements 0.80036
published_at 2026-04-02T12:55:00Z
5
value 0.01347
scoring_system epss
scoring_elements 0.80046
published_at 2026-04-07T12:55:00Z
6
value 0.01347
scoring_system epss
scoring_elements 0.80075
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38477
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295016
reference_id 2295016
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295016
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38477.json
reference_id CVE-2024-38477
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38477.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-22T16:23:13Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:4719
reference_id RHSA-2024:4719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4719
15
reference_url https://access.redhat.com/errata/RHSA-2024:4720
reference_id RHSA-2024:4720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4720
16
reference_url https://access.redhat.com/errata/RHSA-2024:4726
reference_id RHSA-2024:4726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4726
17
reference_url https://access.redhat.com/errata/RHSA-2024:4820
reference_id RHSA-2024:4820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4820
18
reference_url https://access.redhat.com/errata/RHSA-2024:4827
reference_id RHSA-2024:4827
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4827
19
reference_url https://access.redhat.com/errata/RHSA-2024:4830
reference_id RHSA-2024:4830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4830
20
reference_url https://access.redhat.com/errata/RHSA-2024:4862
reference_id RHSA-2024:4862
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4862
21
reference_url https://access.redhat.com/errata/RHSA-2024:4863
reference_id RHSA-2024:4863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4863
22
reference_url https://access.redhat.com/errata/RHSA-2024:4938
reference_id RHSA-2024:4938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4938
23
reference_url https://access.redhat.com/errata/RHSA-2024:4943
reference_id RHSA-2024:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4943
24
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
25
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
26
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
27
reference_url https://usn.ubuntu.com/6885-3/
reference_id USN-6885-3
reference_type
scores
url https://usn.ubuntu.com/6885-3/
fixed_packages
aliases CVE-2024-38477
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pjxs-hnjr-duey
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd@2.4.51-7.el9_0%3Farch=7