Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/3774?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3774?format=api", "vulnerability_id": "VCID-khfr-kgtb-rfam", "summary": "When under stress, closing many connections, the HTTP/2 handling code would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.", "aliases": [ { "alias": "CVE-2017-9789" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371538?format=api", "purl": "pkg:alpm/archlinux/apache@2.4.27-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bej-9h7w-33c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/apache@2.4.27-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/546?format=api", "purl": "pkg:apache/httpd@2.4.27", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17hy-4ppt-xyhw" }, { "vulnerability": "VCID-3djp-gq4c-1fa9" }, { "vulnerability": "VCID-5bej-9h7w-33c8" }, { "vulnerability": "VCID-5xrt-1n1q-4bey" }, { "vulnerability": "VCID-66k7-maf9-dfcd" }, { "vulnerability": "VCID-6vxq-uxxw-ybeh" }, { "vulnerability": "VCID-7u2r-egf2-vfhx" }, { "vulnerability": "VCID-91u7-vh6n-v7fm" }, { "vulnerability": "VCID-9qdr-1v39-d7b7" }, { "vulnerability": "VCID-9vzm-qtye-ufh2" }, { "vulnerability": "VCID-a9rw-3s1y-hqd7" }, { "vulnerability": "VCID-apfh-r85v-dbhz" }, { "vulnerability": "VCID-auhk-ppv5-buaa" }, { "vulnerability": "VCID-bvkg-nrwd-e7g8" }, { "vulnerability": "VCID-ct26-19cq-8kd7" }, { "vulnerability": "VCID-e3jc-83a7-8uhh" }, { "vulnerability": "VCID-eesz-v6ae-gya3" }, { "vulnerability": "VCID-ehv1-yvpu-ubcg" }, { "vulnerability": "VCID-f2y3-s6j8-7ygr" }, { "vulnerability": "VCID-fqem-96w3-rucb" }, { "vulnerability": "VCID-h6kk-81jx-h7b8" }, { "vulnerability": "VCID-jzuw-73df-mfff" }, { "vulnerability": "VCID-q5wm-suxb-jfeb" }, { "vulnerability": "VCID-scf1-zmu7-e3b2" }, { "vulnerability": "VCID-uwqg-yytc-vfae" }, { "vulnerability": "VCID-v41h-pbbe-zfas" }, { "vulnerability": "VCID-w6p6-u8ku-k3f6" }, { "vulnerability": "VCID-y3k1-c4rn-xbc2" }, { "vulnerability": "VCID-yz3c-arnr-y3cs" }, { "vulnerability": "VCID-zc2p-sfu7-jkhc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.27" }, { "url": "http://public2.vulnerablecode.io/api/packages/539786?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=aarch64&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=aarch64&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/539787?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=armhf&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=armhf&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/539788?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/539789?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=s390x&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=s390x&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/539790?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/539791?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86_64&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86_64&distroversion=v3.6&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/978645?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=aarch64&distroversion=v3.5&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=aarch64&distroversion=v3.5&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/978647?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86&distroversion=v3.5&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86&distroversion=v3.5&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/978648?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86_64&distroversion=v3.5&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86_64&distroversion=v3.5&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/1011879?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=armhf&distroversion=v3.4&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=armhf&distroversion=v3.4&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/1011880?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86&distroversion=v3.4&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86&distroversion=v3.4&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/1011881?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86_64&distroversion=v3.4&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86_64&distroversion=v3.4&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/1046304?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=armhf&distroversion=v3.3&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=armhf&distroversion=v3.3&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/978646?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=armhf&distroversion=v3.5&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=armhf&distroversion=v3.5&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/1046305?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86&distroversion=v3.3&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86&distroversion=v3.3&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/1046306?format=api", "purl": "pkg:apk/alpine/apache2@2.4.27-r0?arch=x86_64&distroversion=v3.3&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/apache2@2.4.27-r0%3Farch=x86_64&distroversion=v3.3&reponame=main" }, { "url": "http://public2.vulnerablecode.io/api/packages/582525?format=api", "purl": "pkg:deb/debian/apache2@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582274?format=api", "purl": "pkg:deb/debian/apache2@2.4.62-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.62-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582275?format=api", "purl": "pkg:deb/debian/apache2@2.4.66-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582276?format=api", "purl": "pkg:deb/debian/apache2@2.4.66-1~deb13u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-1~deb13u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582277?format=api", "purl": "pkg:deb/debian/apache2@2.4.66-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/apache2@2.4.66-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/85312?format=api", "purl": "pkg:ebuild/www-servers/apache@2.4.27-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/apache@2.4.27-r1" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371537?format=api", "purl": "pkg:alpm/archlinux/apache@2.4.26-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-jt89-ruvk-1kbj" }, { "vulnerability": "VCID-khfr-kgtb-rfam" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/apache@2.4.26-3" }, { "url": "http://public2.vulnerablecode.io/api/packages/545?format=api", "purl": "pkg:apache/httpd@2.4.26", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17hy-4ppt-xyhw" }, { "vulnerability": "VCID-3djp-gq4c-1fa9" }, { "vulnerability": "VCID-5bej-9h7w-33c8" }, { "vulnerability": "VCID-5xrt-1n1q-4bey" }, { "vulnerability": "VCID-66k7-maf9-dfcd" }, { "vulnerability": "VCID-6vxq-uxxw-ybeh" }, { "vulnerability": "VCID-7u2r-egf2-vfhx" }, { "vulnerability": "VCID-91u7-vh6n-v7fm" }, { "vulnerability": "VCID-9qdr-1v39-d7b7" }, { "vulnerability": "VCID-9vzm-qtye-ufh2" }, { "vulnerability": "VCID-a9rw-3s1y-hqd7" }, { "vulnerability": "VCID-apfh-r85v-dbhz" }, { "vulnerability": "VCID-auhk-ppv5-buaa" }, { "vulnerability": "VCID-bvkg-nrwd-e7g8" }, { "vulnerability": "VCID-ct26-19cq-8kd7" }, { "vulnerability": "VCID-e3jc-83a7-8uhh" }, { "vulnerability": "VCID-eesz-v6ae-gya3" }, { "vulnerability": "VCID-ehv1-yvpu-ubcg" }, { "vulnerability": "VCID-f2y3-s6j8-7ygr" }, { "vulnerability": "VCID-fqem-96w3-rucb" }, { "vulnerability": "VCID-h6kk-81jx-h7b8" }, { "vulnerability": "VCID-jt89-ruvk-1kbj" }, { "vulnerability": "VCID-jzuw-73df-mfff" }, { "vulnerability": "VCID-khfr-kgtb-rfam" }, { "vulnerability": "VCID-q5wm-suxb-jfeb" }, { "vulnerability": "VCID-scf1-zmu7-e3b2" }, { "vulnerability": "VCID-uwqg-yytc-vfae" }, { "vulnerability": "VCID-v41h-pbbe-zfas" }, { "vulnerability": "VCID-w6p6-u8ku-k3f6" }, { "vulnerability": "VCID-y3k1-c4rn-xbc2" }, { "vulnerability": "VCID-yz3c-arnr-y3cs" }, { "vulnerability": "VCID-zc2p-sfu7-jkhc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/httpd@2.4.26" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9789.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9789.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9789", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93864", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.9383", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93835", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93836", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93858", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93805", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93814", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93818", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12192", "scoring_system": "epss", "scoring_elements": "0.93827", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9789" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:P" }, { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470750", "reference_id": "1470750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470750" }, { "reference_url": "https://security.archlinux.org/ASA-201707-15", "reference_id": "ASA-201707-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201707-15" }, { "reference_url": "https://security.archlinux.org/AVG-350", "reference_id": "AVG-350", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-350" }, { "reference_url": "https://httpd.apache.org/security/json/CVE-2017-9789.json", "reference_id": "CVE-2017-9789", "reference_type": "", "scores": [ { "value": "important", "scoring_system": "apache_httpd", "scoring_elements": "" } ], "url": "https://httpd.apache.org/security/json/CVE-2017-9789.json" }, { "reference_url": "https://security.gentoo.org/glsa/201710-32", "reference_id": "GLSA-201710-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-32" } ], "weaknesses": [ { "cwe_id": 416, "name": "Use After Free", "description": "Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code." } ], "exploits": [], "severity_range_score": "4.0 - 10.0", "exploitability": "0.5", "weighted_severity": "9.0", "risk_score": 4.5, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khfr-kgtb-rfam" }