Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/httpd@2.0.46-75?arch=ent
Typerpm
Namespaceredhat
Namehttpd
Version2.0.46-75
Qualifiers
arch ent
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-pdj3-4txb-vych
vulnerability_id VCID-pdj3-4txb-vych
summary A denial of service flaw was found in the mod_deflate module. This module continued to compress large files until compression was complete, even if the network connection that requested the content was closed before compression completed. This would cause mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1891.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1891
reference_id
reference_type
scores
0
value 0.18846
scoring_system epss
scoring_elements 0.95301
published_at 2026-04-13T12:55:00Z
1
value 0.18846
scoring_system epss
scoring_elements 0.9526
published_at 2026-04-01T12:55:00Z
2
value 0.18846
scoring_system epss
scoring_elements 0.95272
published_at 2026-04-02T12:55:00Z
3
value 0.18846
scoring_system epss
scoring_elements 0.95278
published_at 2026-04-04T12:55:00Z
4
value 0.18846
scoring_system epss
scoring_elements 0.95283
published_at 2026-04-07T12:55:00Z
5
value 0.18846
scoring_system epss
scoring_elements 0.95291
published_at 2026-04-08T12:55:00Z
6
value 0.18846
scoring_system epss
scoring_elements 0.95293
published_at 2026-04-09T12:55:00Z
7
value 0.18846
scoring_system epss
scoring_elements 0.95298
published_at 2026-04-11T12:55:00Z
8
value 0.18846
scoring_system epss
scoring_elements 0.95299
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1891
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=509125
reference_id 509125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=509125
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712
reference_id 534712
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712
5
reference_url https://httpd.apache.org/security/json/CVE-2009-1891.json
reference_id CVE-2009-1891
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-1891.json
6
reference_url https://security.gentoo.org/glsa/200907-04
reference_id GLSA-200907-04
reference_type
scores
url https://security.gentoo.org/glsa/200907-04
7
reference_url https://access.redhat.com/errata/RHSA-2009:1148
reference_id RHSA-2009:1148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1148
8
reference_url https://access.redhat.com/errata/RHSA-2009:1155
reference_id RHSA-2009:1155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1155
9
reference_url https://access.redhat.com/errata/RHSA-2009:1160
reference_id RHSA-2009:1160
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1160
10
reference_url https://access.redhat.com/errata/RHSA-2009:1205
reference_id RHSA-2009:1205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1205
11
reference_url https://usn.ubuntu.com/802-1/
reference_id USN-802-1
reference_type
scores
url https://usn.ubuntu.com/802-1/
fixed_packages
aliases CVE-2009-1891
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdj3-4txb-vych
1
url VCID-umuk-3n1q-3qet
vulnerability_id VCID-umuk-3n1q-3qet
summary A flaw in apr_palloc() in the bundled copy of APR could cause heap overflows in programs that try to apr_palloc() a user controlled size. The Apache HTTP Server itself does not pass unsanitized user-provided sizes to this function, so it could only be triggered through some other application which uses apr_palloc() in a vulnerable way.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2412.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2412
reference_id
reference_type
scores
0
value 0.07751
scoring_system epss
scoring_elements 0.91943
published_at 2026-04-13T12:55:00Z
1
value 0.07751
scoring_system epss
scoring_elements 0.91904
published_at 2026-04-01T12:55:00Z
2
value 0.07751
scoring_system epss
scoring_elements 0.91912
published_at 2026-04-02T12:55:00Z
3
value 0.07751
scoring_system epss
scoring_elements 0.9192
published_at 2026-04-04T12:55:00Z
4
value 0.07751
scoring_system epss
scoring_elements 0.91926
published_at 2026-04-07T12:55:00Z
5
value 0.07751
scoring_system epss
scoring_elements 0.91939
published_at 2026-04-08T12:55:00Z
6
value 0.07751
scoring_system epss
scoring_elements 0.91944
published_at 2026-04-09T12:55:00Z
7
value 0.07751
scoring_system epss
scoring_elements 0.91947
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2412
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=515698
reference_id 515698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=515698
4
reference_url https://httpd.apache.org/security/json/CVE-2009-2412.json
reference_id CVE-2009-2412
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-2412.json
5
reference_url https://security.gentoo.org/glsa/200909-03
reference_id GLSA-200909-03
reference_type
scores
url https://security.gentoo.org/glsa/200909-03
6
reference_url https://access.redhat.com/errata/RHSA-2009:1204
reference_id RHSA-2009:1204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1204
7
reference_url https://access.redhat.com/errata/RHSA-2009:1205
reference_id RHSA-2009:1205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1205
8
reference_url https://access.redhat.com/errata/RHSA-2009:1462
reference_id RHSA-2009:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1462
9
reference_url https://usn.ubuntu.com/813-1/
reference_id USN-813-1
reference_type
scores
url https://usn.ubuntu.com/813-1/
10
reference_url https://usn.ubuntu.com/813-2/
reference_id USN-813-2
reference_type
scores
url https://usn.ubuntu.com/813-2/
11
reference_url https://usn.ubuntu.com/813-3/
reference_id USN-813-3
reference_type
scores
url https://usn.ubuntu.com/813-3/
fixed_packages
aliases CVE-2009-2412
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umuk-3n1q-3qet
Fixing_vulnerabilities
Risk_score1.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd@2.0.46-75%3Farch=ent