Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/httpd@2.0.46-75?arch=ent |
| Type | rpm |
| Namespace | redhat |
| Name | httpd |
| Version | 2.0.46-75 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-pdj3-4txb-vych |
| vulnerability_id |
VCID-pdj3-4txb-vych |
| summary |
A denial of service flaw was found in the mod_deflate module. This module continued to compress large files until compression was complete, even if the network connection that requested the content was closed before compression completed. This would cause mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1891 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95301 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.9526 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95272 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95278 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95283 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95291 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95293 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95298 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.18846 |
| scoring_system |
epss |
| scoring_elements |
0.95299 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-1891 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-1891
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pdj3-4txb-vych |
|
| 1 |
| url |
VCID-umuk-3n1q-3qet |
| vulnerability_id |
VCID-umuk-3n1q-3qet |
| summary |
A flaw in apr_palloc() in the bundled copy of APR could cause heap overflows in programs that try to apr_palloc() a user controlled size. The Apache HTTP Server itself does not pass unsanitized user-provided sizes to this function, so it could only be triggered through some other application which uses apr_palloc() in a vulnerable way. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2412 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91943 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91904 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91912 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.9192 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91926 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91939 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91944 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07751 |
| scoring_system |
epss |
| scoring_elements |
0.91947 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2412 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2412
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-umuk-3n1q-3qet |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 1.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd@2.0.46-75%3Farch=ent |