Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/3774?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3774?format=api",
    "vulnerability_id": "VCID-khfr-kgtb-rfam",
    "summary": "When under stress, closing many connections, the HTTP/2 handling code would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.",
    "aliases": [
        {
            "alias": "CVE-2017-9789"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371538?format=api",
            "purl": "pkg:alpm/archlinux/apache@2.4.27-1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5bej-9h7w-33c8"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/apache@2.4.27-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/546?format=api",
            "purl": "pkg:apache/httpd@2.4.27",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-17hy-4ppt-xyhw"
                },
                {
                    "vulnerability": "VCID-3djp-gq4c-1fa9"
                },
                {
                    "vulnerability": "VCID-5bej-9h7w-33c8"
                },
                {
                    "vulnerability": "VCID-5xrt-1n1q-4bey"
                },
                {
                    "vulnerability": "VCID-66k7-maf9-dfcd"
                },
                {
                    "vulnerability": "VCID-6vxq-uxxw-ybeh"
                },
                {
                    "vulnerability": "VCID-7u2r-egf2-vfhx"
                },
                {
                    "vulnerability": "VCID-91u7-vh6n-v7fm"
                },
                {
                    "vulnerability": "VCID-9qdr-1v39-d7b7"
                },
                {
                    "vulnerability": "VCID-9vzm-qtye-ufh2"
                },
                {
                    "vulnerability": "VCID-a9rw-3s1y-hqd7"
                },
                {
                    "vulnerability": "VCID-apfh-r85v-dbhz"
                },
                {
                    "vulnerability": "VCID-auhk-ppv5-buaa"
                },
                {
                    "vulnerability": "VCID-bvkg-nrwd-e7g8"
                },
                {
                    "vulnerability": "VCID-ct26-19cq-8kd7"
                },
                {
                    "vulnerability": "VCID-e3jc-83a7-8uhh"
                },
                {
                    "vulnerability": "VCID-eesz-v6ae-gya3"
                },
                {
                    "vulnerability": "VCID-ehv1-yvpu-ubcg"
                },
                {
                    "vulnerability": "VCID-f2y3-s6j8-7ygr"
                },
                {
                    "vulnerability": "VCID-fqem-96w3-rucb"
                },
                {
                    "vulnerability": "VCID-h6kk-81jx-h7b8"
                },
                {
                    "vulnerability": "VCID-jzuw-73df-mfff"
                },
                {
                    "vulnerability": "VCID-q5wm-suxb-jfeb"
                },
                {
                    "vulnerability": "VCID-scf1-zmu7-e3b2"
                },
                {
                    "vulnerability": "VCID-uwqg-yytc-vfae"
                },
                {
                    "vulnerability": "VCID-v41h-pbbe-zfas"
                },
                {
                    "vulnerability": "VCID-w6p6-u8ku-k3f6"
                },
                {
                    "vulnerability": "VCID-y3k1-c4rn-xbc2"
                },
                {
                    "vulnerability": "VCID-yz3c-arnr-y3cs"
                },
                {
                    "vulnerability": "VCID-zc2p-sfu7-jkhc"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.27"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/539786?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=aarch64&distroversion=v3.6&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=aarch64&distroversion=v3.6&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/539787?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=armhf&distroversion=v3.6&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=armhf&distroversion=v3.6&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/539788?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=ppc64le&distroversion=v3.6&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/539789?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=s390x&distroversion=v3.6&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=s390x&distroversion=v3.6&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/539790?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86&distroversion=v3.6&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86&distroversion=v3.6&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/539791?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86_64&distroversion=v3.6&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86_64&distroversion=v3.6&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/978645?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=aarch64&distroversion=v3.5&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=aarch64&distroversion=v3.5&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/978647?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86&distroversion=v3.5&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86&distroversion=v3.5&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/978648?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86_64&distroversion=v3.5&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86_64&distroversion=v3.5&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1011879?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=armhf&distroversion=v3.4&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=armhf&distroversion=v3.4&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1011880?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86&distroversion=v3.4&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86&distroversion=v3.4&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1011881?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86_64&distroversion=v3.4&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86_64&distroversion=v3.4&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1046304?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=armhf&distroversion=v3.3&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=armhf&distroversion=v3.3&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/978646?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=armhf&distroversion=v3.5&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=armhf&distroversion=v3.5&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1046305?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86&distroversion=v3.3&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86&distroversion=v3.3&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1046306?format=api",
            "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86_64&distroversion=v3.3&reponame=main",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86_64&distroversion=v3.3&reponame=main"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/582525?format=api",
            "purl": "pkg:deb/debian/apache2@0?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@0%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/582274?format=api",
            "purl": "pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/582275?format=api",
            "purl": "pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/582276?format=api",
            "purl": "pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/582277?format=api",
            "purl": "pkg:deb/debian/apache2@2.4.66-8?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/85312?format=api",
            "purl": "pkg:ebuild/www-servers/apache@2.4.27-r1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.4.27-r1"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371537?format=api",
            "purl": "pkg:alpm/archlinux/apache@2.4.26-3",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-jt89-ruvk-1kbj"
                },
                {
                    "vulnerability": "VCID-khfr-kgtb-rfam"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/apache@2.4.26-3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/545?format=api",
            "purl": "pkg:apache/httpd@2.4.26",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-17hy-4ppt-xyhw"
                },
                {
                    "vulnerability": "VCID-3djp-gq4c-1fa9"
                },
                {
                    "vulnerability": "VCID-5bej-9h7w-33c8"
                },
                {
                    "vulnerability": "VCID-5xrt-1n1q-4bey"
                },
                {
                    "vulnerability": "VCID-66k7-maf9-dfcd"
                },
                {
                    "vulnerability": "VCID-6vxq-uxxw-ybeh"
                },
                {
                    "vulnerability": "VCID-7u2r-egf2-vfhx"
                },
                {
                    "vulnerability": "VCID-91u7-vh6n-v7fm"
                },
                {
                    "vulnerability": "VCID-9qdr-1v39-d7b7"
                },
                {
                    "vulnerability": "VCID-9vzm-qtye-ufh2"
                },
                {
                    "vulnerability": "VCID-a9rw-3s1y-hqd7"
                },
                {
                    "vulnerability": "VCID-apfh-r85v-dbhz"
                },
                {
                    "vulnerability": "VCID-auhk-ppv5-buaa"
                },
                {
                    "vulnerability": "VCID-bvkg-nrwd-e7g8"
                },
                {
                    "vulnerability": "VCID-ct26-19cq-8kd7"
                },
                {
                    "vulnerability": "VCID-e3jc-83a7-8uhh"
                },
                {
                    "vulnerability": "VCID-eesz-v6ae-gya3"
                },
                {
                    "vulnerability": "VCID-ehv1-yvpu-ubcg"
                },
                {
                    "vulnerability": "VCID-f2y3-s6j8-7ygr"
                },
                {
                    "vulnerability": "VCID-fqem-96w3-rucb"
                },
                {
                    "vulnerability": "VCID-h6kk-81jx-h7b8"
                },
                {
                    "vulnerability": "VCID-jt89-ruvk-1kbj"
                },
                {
                    "vulnerability": "VCID-jzuw-73df-mfff"
                },
                {
                    "vulnerability": "VCID-khfr-kgtb-rfam"
                },
                {
                    "vulnerability": "VCID-q5wm-suxb-jfeb"
                },
                {
                    "vulnerability": "VCID-scf1-zmu7-e3b2"
                },
                {
                    "vulnerability": "VCID-uwqg-yytc-vfae"
                },
                {
                    "vulnerability": "VCID-v41h-pbbe-zfas"
                },
                {
                    "vulnerability": "VCID-w6p6-u8ku-k3f6"
                },
                {
                    "vulnerability": "VCID-y3k1-c4rn-xbc2"
                },
                {
                    "vulnerability": "VCID-yz3c-arnr-y3cs"
                },
                {
                    "vulnerability": "VCID-zc2p-sfu7-jkhc"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.26"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9789.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9789.json"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9789",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93796",
                    "published_at": "2026-04-01T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93864",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.9383",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93835",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93836",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93858",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93805",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93814",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93818",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.12192",
                    "scoring_system": "epss",
                    "scoring_elements": "0.93827",
                    "published_at": "2026-04-08T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9789"
        },
        {
            "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "4",
                    "scoring_system": "cvssv2",
                    "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:P"
                },
                {
                    "value": "4.8",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                }
            ],
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470750",
            "reference_id": "1470750",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470750"
        },
        {
            "reference_url": "https://security.archlinux.org/ASA-201707-15",
            "reference_id": "ASA-201707-15",
            "reference_type": "",
            "scores": [],
            "url": "https://security.archlinux.org/ASA-201707-15"
        },
        {
            "reference_url": "https://security.archlinux.org/AVG-350",
            "reference_id": "AVG-350",
            "reference_type": "",
            "scores": [
                {
                    "value": "Critical",
                    "scoring_system": "archlinux",
                    "scoring_elements": ""
                }
            ],
            "url": "https://security.archlinux.org/AVG-350"
        },
        {
            "reference_url": "https://httpd.apache.org/security/json/CVE-2017-9789.json",
            "reference_id": "CVE-2017-9789",
            "reference_type": "",
            "scores": [
                {
                    "value": "important",
                    "scoring_system": "apache_httpd",
                    "scoring_elements": ""
                }
            ],
            "url": "https://httpd.apache.org/security/json/CVE-2017-9789.json"
        },
        {
            "reference_url": "https://security.gentoo.org/glsa/201710-32",
            "reference_id": "GLSA-201710-32",
            "reference_type": "",
            "scores": [],
            "url": "https://security.gentoo.org/glsa/201710-32"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 416,
            "name": "Use After Free",
            "description": "Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."
        }
    ],
    "exploits": [],
    "severity_range_score": "4.0 - 10.0",
    "exploitability": "0.5",
    "weighted_severity": "9.0",
    "risk_score": 4.5,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khfr-kgtb-rfam"
}