Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-pbr8-a3hw-fyb7
SummaryApache:: Status XSS flaw
Aliases
0
alias CVE-2009-0796
Fixed_packages
0
url pkg:deb/debian/libapache2-mod-perl2@2.0.4-6?distro=trixie
purl pkg:deb/debian/libapache2-mod-perl2@2.0.4-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache2-mod-perl2@2.0.4-6%3Fdistro=trixie
1
url pkg:deb/debian/libapache2-mod-perl2@2.0.4-7%2Bsqueeze1
purl pkg:deb/debian/libapache2-mod-perl2@2.0.4-7%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vr7x-kn84-y3dv
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache2-mod-perl2@2.0.4-7%252Bsqueeze1
2
url pkg:deb/debian/libapache2-mod-perl2@2.0.11-4?distro=trixie
purl pkg:deb/debian/libapache2-mod-perl2@2.0.11-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache2-mod-perl2@2.0.11-4%3Fdistro=trixie
3
url pkg:deb/debian/libapache2-mod-perl2@2.0.12-1?distro=trixie
purl pkg:deb/debian/libapache2-mod-perl2@2.0.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache2-mod-perl2@2.0.12-1%3Fdistro=trixie
4
url pkg:deb/debian/libapache2-mod-perl2@2.0.13-2?distro=trixie
purl pkg:deb/debian/libapache2-mod-perl2@2.0.13-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache2-mod-perl2@2.0.13-2%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/libapache2-mod-perl2@1.999.21-1
purl pkg:deb/debian/libapache2-mod-perl2@1.999.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9zzc-scyf-ckdb
1
vulnerability VCID-pbr8-a3hw-fyb7
2
vulnerability VCID-vr7x-kn84-y3dv
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache2-mod-perl2@1.999.21-1
1
url pkg:deb/debian/libapache2-mod-perl2@2.0.2-2.4
purl pkg:deb/debian/libapache2-mod-perl2@2.0.2-2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9zzc-scyf-ckdb
1
vulnerability VCID-pbr8-a3hw-fyb7
2
vulnerability VCID-vr7x-kn84-y3dv
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache2-mod-perl2@2.0.2-2.4
2
url pkg:deb/debian/libapache2-mod-perl2@2.0.4-5%2Blenny1
purl pkg:deb/debian/libapache2-mod-perl2@2.0.4-5%2Blenny1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pbr8-a3hw-fyb7
1
vulnerability VCID-vr7x-kn84-y3dv
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libapache2-mod-perl2@2.0.4-5%252Blenny1
References
0
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0796.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0796.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0796
reference_id
reference_type
scores
0
value 0.60732
scoring_system epss
scoring_elements 0.983
published_at 2026-04-18T12:55:00Z
1
value 0.60732
scoring_system epss
scoring_elements 0.98278
published_at 2026-04-01T12:55:00Z
2
value 0.60732
scoring_system epss
scoring_elements 0.9828
published_at 2026-04-02T12:55:00Z
3
value 0.60732
scoring_system epss
scoring_elements 0.98283
published_at 2026-04-04T12:55:00Z
4
value 0.60732
scoring_system epss
scoring_elements 0.98284
published_at 2026-04-07T12:55:00Z
5
value 0.60732
scoring_system epss
scoring_elements 0.98288
published_at 2026-04-08T12:55:00Z
6
value 0.60732
scoring_system epss
scoring_elements 0.98289
published_at 2026-04-09T12:55:00Z
7
value 0.60732
scoring_system epss
scoring_elements 0.98293
published_at 2026-04-13T12:55:00Z
8
value 0.60732
scoring_system epss
scoring_elements 0.98299
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0796
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0796
4
reference_url http://secunia.com/advisories/34597
reference_id
reference_type
scores
url http://secunia.com/advisories/34597
5
reference_url https://launchpad.net/bugs/cve/2009-0796
reference_id
reference_type
scores
url https://launchpad.net/bugs/cve/2009-0796
6
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488
7
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
8
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1
9
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
10
reference_url http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h
reference_id
reference_type
scores
url http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h
11
reference_url http://svn.apache.org/viewvc?view=rev&revision=761081
reference_id
reference_type
scores
url http://svn.apache.org/viewvc?view=rev&revision=761081
12
reference_url http://www.gossamer-threads.com/lists/modperl/modperl/99475#99475
reference_id
reference_type
scores
url http://www.gossamer-threads.com/lists/modperl/modperl/99475#99475
13
reference_url http://www.gossamer-threads.com/lists/modperl/modperl-cvs/99477#99477
reference_id
reference_type
scores
url http://www.gossamer-threads.com/lists/modperl/modperl-cvs/99477#99477
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:091
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:091
15
reference_url http://www.securityfocus.com/archive/1/502709/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/502709/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/34383
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34383
17
reference_url http://www.securitytracker.com/id?1021988
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021988
18
reference_url http://www.vupen.com/english/advisories/2009/0943
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0943
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=494402
reference_id 494402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=494402
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567635
reference_id 567635
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567635
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mod_perl:1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:mod_perl:1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mod_perl:1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mod_perl:2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:mod_perl:2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:mod_perl:2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0796
reference_id CVE-2009-0796
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2009-0796
Weaknesses
0
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Exploits
0
date_added 2009-11-08
description Apache mod_perl - 'Apache::Status' / 'Apache2::Status' Cross-Site Scripting
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2009-11-09
exploit_type remote
platform multiple
source_date_updated 2017-01-31
data_source Exploit-DB
source_url https://www.securityfocus.com/bid/34383/info
Severity_range_score2.6 - 2.6
Exploitability2.0
Weighted_severity2.3
Risk_score4.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-pbr8-a3hw-fyb7