Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/httpd@2.4.51-7.el9_0?arch=8
Typerpm
Namespaceredhat
Namehttpd
Version2.4.51-7.el9_0
Qualifiers
arch 8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-8nw9-zpxn-ckab
vulnerability_id VCID-8nw9-zpxn-ckab
summary
Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38476.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38476.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38476
reference_id
reference_type
scores
0
value 0.03452
scoring_system epss
scoring_elements 0.87486
published_at 2026-04-07T12:55:00Z
1
value 0.03452
scoring_system epss
scoring_elements 0.87519
published_at 2026-04-12T12:55:00Z
2
value 0.03452
scoring_system epss
scoring_elements 0.87523
published_at 2026-04-11T12:55:00Z
3
value 0.03452
scoring_system epss
scoring_elements 0.87512
published_at 2026-04-09T12:55:00Z
4
value 0.03452
scoring_system epss
scoring_elements 0.87505
published_at 2026-04-08T12:55:00Z
5
value 0.03452
scoring_system epss
scoring_elements 0.87515
published_at 2026-04-13T12:55:00Z
6
value 0.03545
scoring_system epss
scoring_elements 0.87649
published_at 2026-04-04T12:55:00Z
7
value 0.03545
scoring_system epss
scoring_elements 0.87636
published_at 2026-04-02T12:55:00Z
8
value 0.04554
scoring_system epss
scoring_elements 0.89205
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38476
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2295015
reference_id 2295015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2295015
11
reference_url https://httpd.apache.org/security/json/CVE-2024-38476.json
reference_id CVE-2024-38476
reference_type
scores
url https://httpd.apache.org/security/json/CVE-2024-38476.json
12
reference_url https://security.gentoo.org/glsa/202409-31
reference_id GLSA-202409-31
reference_type
scores
url https://security.gentoo.org/glsa/202409-31
13
reference_url https://security.netapp.com/advisory/ntap-20240712-0001/
reference_id ntap-20240712-0001
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-29T03:55:12Z/
url https://security.netapp.com/advisory/ntap-20240712-0001/
14
reference_url https://access.redhat.com/errata/RHSA-2024:5138
reference_id RHSA-2024:5138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5138
15
reference_url https://access.redhat.com/errata/RHSA-2024:5193
reference_id RHSA-2024:5193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5193
16
reference_url https://access.redhat.com/errata/RHSA-2024:5239
reference_id RHSA-2024:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5239
17
reference_url https://access.redhat.com/errata/RHSA-2024:5240
reference_id RHSA-2024:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5240
18
reference_url https://access.redhat.com/errata/RHSA-2024:5812
reference_id RHSA-2024:5812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5812
19
reference_url https://access.redhat.com/errata/RHSA-2024:5832
reference_id RHSA-2024:5832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5832
20
reference_url https://access.redhat.com/errata/RHSA-2024:6136
reference_id RHSA-2024:6136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6136
21
reference_url https://access.redhat.com/errata/RHSA-2024:6467
reference_id RHSA-2024:6467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6467
22
reference_url https://access.redhat.com/errata/RHSA-2024:6468
reference_id RHSA-2024:6468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6468
23
reference_url https://access.redhat.com/errata/RHSA-2024:6583
reference_id RHSA-2024:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6583
24
reference_url https://access.redhat.com/errata/RHSA-2024:6584
reference_id RHSA-2024:6584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6584
25
reference_url https://access.redhat.com/errata/RHSA-2024:7101
reference_id RHSA-2024:7101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7101
26
reference_url https://usn.ubuntu.com/6885-1/
reference_id USN-6885-1
reference_type
scores
url https://usn.ubuntu.com/6885-1/
27
reference_url https://usn.ubuntu.com/6885-3/
reference_id USN-6885-3
reference_type
scores
url https://usn.ubuntu.com/6885-3/
fixed_packages
aliases CVE-2024-38476
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8nw9-zpxn-ckab
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd@2.4.51-7.el9_0%3Farch=8