Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/trafficserver@3.0.5-1
Typedeb
Namespacedebian
Nametrafficserver
Version3.0.5-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version9.2.5+ds-0+deb12u3
Latest_non_vulnerable_version9.2.5+ds-0+deb12u3
Affected_by_vulnerabilities
0
url VCID-41x7-hv4u-byb9
vulnerability_id VCID-41x7-hv4u-byb9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32749
reference_id
reference_type
scores
0
value 0.00921
scoring_system epss
scoring_elements 0.75944
published_at 2026-04-04T12:55:00Z
1
value 0.00921
scoring_system epss
scoring_elements 0.75912
published_at 2026-04-02T12:55:00Z
2
value 0.01339
scoring_system epss
scoring_elements 0.80008
published_at 2026-04-09T12:55:00Z
3
value 0.01339
scoring_system epss
scoring_elements 0.79971
published_at 2026-04-07T12:55:00Z
4
value 0.01339
scoring_system epss
scoring_elements 0.79999
published_at 2026-04-08T12:55:00Z
5
value 0.01339
scoring_system epss
scoring_elements 0.80028
published_at 2026-04-11T12:55:00Z
6
value 0.06551
scoring_system epss
scoring_elements 0.91164
published_at 2026-04-21T12:55:00Z
7
value 0.06551
scoring_system epss
scoring_elements 0.91137
published_at 2026-04-12T12:55:00Z
8
value 0.06551
scoring_system epss
scoring_elements 0.91136
published_at 2026-04-13T12:55:00Z
9
value 0.06551
scoring_system epss
scoring_elements 0.91161
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32749
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392
3
reference_url https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
reference_id mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-17T14:20:46Z/
url https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-32749
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-41x7-hv4u-byb9
1
url VCID-4js5-31yx-gkf1
vulnerability_id VCID-4js5-31yx-gkf1
summary Unspecified vulnerability in the HTTP/2 experimental feature in Apache Traffic Server before 5.3.x before 5.3.2 has unknown impact and attack vectors, a different vulnerability than CVE-2015-5168.
references
0
reference_url http://mail-archives.us.apache.org/mod_mbox/www-announce/201509.mbox/%3CCABF6JR2j5vesvnjbm6sDPB_zAGj3kNgzzHEpLUh6dWG6t8mC2w%40mail.gmail.com%3E
reference_id
reference_type
scores
url http://mail-archives.us.apache.org/mod_mbox/www-announce/201509.mbox/%3CCABF6JR2j5vesvnjbm6sDPB_zAGj3kNgzzHEpLUh6dWG6t8mC2w%40mail.gmail.com%3E
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5206
reference_id
reference_type
scores
0
value 0.01903
scoring_system epss
scoring_elements 0.83283
published_at 2026-04-21T12:55:00Z
1
value 0.01903
scoring_system epss
scoring_elements 0.83282
published_at 2026-04-18T12:55:00Z
2
value 0.01903
scoring_system epss
scoring_elements 0.83178
published_at 2026-04-01T12:55:00Z
3
value 0.01903
scoring_system epss
scoring_elements 0.83195
published_at 2026-04-02T12:55:00Z
4
value 0.01903
scoring_system epss
scoring_elements 0.83209
published_at 2026-04-04T12:55:00Z
5
value 0.01903
scoring_system epss
scoring_elements 0.83207
published_at 2026-04-07T12:55:00Z
6
value 0.01903
scoring_system epss
scoring_elements 0.83232
published_at 2026-04-08T12:55:00Z
7
value 0.01903
scoring_system epss
scoring_elements 0.83239
published_at 2026-04-09T12:55:00Z
8
value 0.01903
scoring_system epss
scoring_elements 0.83255
published_at 2026-04-11T12:55:00Z
9
value 0.01903
scoring_system epss
scoring_elements 0.83249
published_at 2026-04-12T12:55:00Z
10
value 0.01903
scoring_system epss
scoring_elements 0.83244
published_at 2026-04-13T12:55:00Z
11
value 0.01903
scoring_system epss
scoring_elements 0.8328
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5206
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:5.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5206
reference_id CVE-2015-5206
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-5206
fixed_packages
0
url pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
purl pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-8aev-nmwa-fkcg
9
vulnerability VCID-931v-ukcc-6qaa
10
vulnerability VCID-aqt5-2ffy-9bgs
11
vulnerability VCID-au6q-ek7r-8bgr
12
vulnerability VCID-b7zx-ywwc-57d9
13
vulnerability VCID-bb5y-kjej-bbfm
14
vulnerability VCID-bdgg-edbf-xfav
15
vulnerability VCID-btm9-vxvc-3qhv
16
vulnerability VCID-c5hc-3jtx-k3a6
17
vulnerability VCID-c675-5njd-63hk
18
vulnerability VCID-cbe5-hhz8-bqbn
19
vulnerability VCID-cscf-sb71-jybq
20
vulnerability VCID-esap-nkps-cfg9
21
vulnerability VCID-fmwc-nmhh-ryaf
22
vulnerability VCID-fq5y-b9yq-nbee
23
vulnerability VCID-hbte-dsw2-y7ad
24
vulnerability VCID-j6r7-ypa1-zybv
25
vulnerability VCID-jabw-thzt-63bb
26
vulnerability VCID-jb1b-9gr2-suez
27
vulnerability VCID-jdjf-3w9k-xbaw
28
vulnerability VCID-k2ks-3t6e-uqgu
29
vulnerability VCID-m8p8-5n65-qyhy
30
vulnerability VCID-msu4-5h99-2yaq
31
vulnerability VCID-n66u-b73u-zucb
32
vulnerability VCID-nbwy-fdv2-uydt
33
vulnerability VCID-p5f7-uu6r-8bez
34
vulnerability VCID-pxaf-6qxa-77h9
35
vulnerability VCID-qwmj-ez4q-7qex
36
vulnerability VCID-r86j-zujn-f7ez
37
vulnerability VCID-rcdg-j23x-xfbn
38
vulnerability VCID-rw58-bnwt-2bam
39
vulnerability VCID-scpg-5hcj-5yd3
40
vulnerability VCID-skrs-cynm-r7du
41
vulnerability VCID-t559-a5u6-4ke1
42
vulnerability VCID-u5qg-vszr-9ye2
43
vulnerability VCID-ue7s-pn8b-vydz
44
vulnerability VCID-uhqf-tsxe-ayc2
45
vulnerability VCID-uhxq-9bzs-u3fd
46
vulnerability VCID-uy1m-av2n-jybt
47
vulnerability VCID-va7d-ktp2-m7et
48
vulnerability VCID-w42s-4aps-y3c5
49
vulnerability VCID-waer-as81-8fed
50
vulnerability VCID-xh97-4sn5-vyfw
51
vulnerability VCID-xwdc-hndy-yubc
52
vulnerability VCID-xwru-y5m9-gucd
53
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@6.2.0-1~bpo8%252B1
aliases CVE-2015-5206
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4js5-31yx-gkf1
2
url VCID-4men-293s-3bhn
vulnerability_id VCID-4men-293s-3bhn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33934
reference_id
reference_type
scores
0
value 0.00299
scoring_system epss
scoring_elements 0.5319
published_at 2026-04-02T12:55:00Z
1
value 0.00299
scoring_system epss
scoring_elements 0.53214
published_at 2026-04-04T12:55:00Z
2
value 0.00299
scoring_system epss
scoring_elements 0.53182
published_at 2026-04-07T12:55:00Z
3
value 0.00299
scoring_system epss
scoring_elements 0.53235
published_at 2026-04-08T12:55:00Z
4
value 0.00299
scoring_system epss
scoring_elements 0.53229
published_at 2026-04-09T12:55:00Z
5
value 0.00299
scoring_system epss
scoring_elements 0.5328
published_at 2026-04-11T12:55:00Z
6
value 0.00299
scoring_system epss
scoring_elements 0.53266
published_at 2026-04-12T12:55:00Z
7
value 0.00299
scoring_system epss
scoring_elements 0.53248
published_at 2026-04-13T12:55:00Z
8
value 0.00299
scoring_system epss
scoring_elements 0.53286
published_at 2026-04-16T12:55:00Z
9
value 0.004
scoring_system epss
scoring_elements 0.60768
published_at 2026-04-18T12:55:00Z
10
value 0.004
scoring_system epss
scoring_elements 0.60753
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33934
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430
reference_id 1043430
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/
reference_id BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/
6
reference_url https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
reference_id jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/
url https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
7
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-33934
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4men-293s-3bhn
3
url VCID-4wwn-74ac-p7dp
vulnerability_id VCID-4wwn-74ac-p7dp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37150
reference_id
reference_type
scores
0
value 0.01159
scoring_system epss
scoring_elements 0.7853
published_at 2026-04-01T12:55:00Z
1
value 0.01159
scoring_system epss
scoring_elements 0.78536
published_at 2026-04-02T12:55:00Z
2
value 0.01159
scoring_system epss
scoring_elements 0.78566
published_at 2026-04-04T12:55:00Z
3
value 0.01159
scoring_system epss
scoring_elements 0.78549
published_at 2026-04-07T12:55:00Z
4
value 0.01159
scoring_system epss
scoring_elements 0.78575
published_at 2026-04-08T12:55:00Z
5
value 0.01159
scoring_system epss
scoring_elements 0.78581
published_at 2026-04-09T12:55:00Z
6
value 0.01159
scoring_system epss
scoring_elements 0.78605
published_at 2026-04-18T12:55:00Z
7
value 0.01159
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-12T12:55:00Z
8
value 0.01159
scoring_system epss
scoring_elements 0.78578
published_at 2026-04-13T12:55:00Z
9
value 0.01159
scoring_system epss
scoring_elements 0.78607
published_at 2026-04-16T12:55:00Z
10
value 0.01159
scoring_system epss
scoring_elements 0.78602
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37150
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
reference_id CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
8
reference_url https://www.debian.org/security/2022/dsa-5206
reference_id dsa-5206
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://www.debian.org/security/2022/dsa-5206
9
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html
10
reference_url https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
reference_id rc64lwbdgrkv674koc3zl1sljr9vwg21
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
reference_id ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37150
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wwn-74ac-p7dp
4
url VCID-568b-s8ks-vfa6
vulnerability_id VCID-568b-s8ks-vfa6
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17565
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.79002
published_at 2026-04-16T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-13T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78928
published_at 2026-04-01T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-02T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78961
published_at 2026-04-04T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-07T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.7897
published_at 2026-04-08T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-09T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-21T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78984
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17565
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17565
reference_id CVE-2019-17565
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17565
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-17565
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-568b-s8ks-vfa6
5
url VCID-5781-s1ny-q7ey
vulnerability_id VCID-5781-s1ny-q7ey
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44487.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44487.json
1
reference_url https://akka.io/security/akka-http-cve-2023-44487.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://akka.io/security/akka-http-cve-2023-44487.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-44487
reference_id
reference_type
scores
0
value 0.94385
scoring_system epss
scoring_elements 0.9997
published_at 2026-04-04T12:55:00Z
1
value 0.94385
scoring_system epss
scoring_elements 0.99971
published_at 2026-04-13T12:55:00Z
2
value 0.94395
scoring_system epss
scoring_elements 0.99974
published_at 2026-04-18T12:55:00Z
3
value 0.9446
scoring_system epss
scoring_elements 0.99993
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-44487
3
reference_url https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size
4
reference_url https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/
5
reference_url https://aws.amazon.com/security/security-bulletins/AWS-2023-011
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://aws.amazon.com/security/security-bulletins/AWS-2023-011
6
reference_url https://aws.amazon.com/security/security-bulletins/AWS-2023-011/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://aws.amazon.com/security/security-bulletins/AWS-2023-011/
7
reference_url https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack
8
reference_url https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
9
reference_url https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack
10
reference_url https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
11
reference_url https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty
12
reference_url https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/
13
reference_url https://bugzilla.proxmox.com/show_bug.cgi?id=4988
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://bugzilla.proxmox.com/show_bug.cgi?id=4988
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242803
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2242803
15
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1216123
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1216123
16
reference_url https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9
17
reference_url https://chaos.social/@icing/111210915918780532
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://chaos.social/@icing/111210915918780532
18
reference_url https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps
19
reference_url https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/
20
reference_url https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
21
reference_url https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34462
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36478
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
27
reference_url https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715
28
reference_url https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve
29
reference_url https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764
30
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
31
reference_url https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088
32
reference_url https://github.com/akka/akka-http/issues/4323
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/akka/akka-http/issues/4323
33
reference_url https://github.com/akka/akka-http/pull/4324
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/akka/akka-http/pull/4324
34
reference_url https://github.com/akka/akka-http/pull/4325
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/akka/akka-http/pull/4325
35
reference_url https://github.com/alibaba/tengine/issues/1872
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/alibaba/tengine/issues/1872
36
reference_url https://github.com/apache/apisix/issues/10320
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/apisix/issues/10320
37
reference_url https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113
38
reference_url https://github.com/apache/httpd-site/pull/10
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/httpd-site/pull/10
39
reference_url https://github.com/apache/tomcat/commit/6d1a9fd6642387969e4410b9989c85856b74917a
reference_id
reference_type
scores
url https://github.com/apache/tomcat/commit/6d1a9fd6642387969e4410b9989c85856b74917a
40
reference_url https://github.com/apache/tomcat/commit/76bb4bfbfeae827dce896f650655bbf6e251ed49
reference_id
reference_type
scores
url https://github.com/apache/tomcat/commit/76bb4bfbfeae827dce896f650655bbf6e251ed49
41
reference_url https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628
42
reference_url https://github.com/apache/tomcat/commit/9cdfe25bad707f34b3e5da2994f3f1952a163c3e
reference_id
reference_type
scores
url https://github.com/apache/tomcat/commit/9cdfe25bad707f34b3e5da2994f3f1952a163c3e
43
reference_url https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2
44
reference_url https://github.com/apache/trafficserver/pull/10564
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/trafficserver/pull/10564
45
reference_url https://github.com/apple/swift-nio-http2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apple/swift-nio-http2
46
reference_url https://github.com/Azure/AKS/issues/3947
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/Azure/AKS/issues/3947
47
reference_url https://github.com/caddyserver/caddy/issues/5877
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/caddyserver/caddy/issues/5877
48
reference_url https://github.com/caddyserver/caddy/releases/tag/v2.7.5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/caddyserver/caddy/releases/tag/v2.7.5
49
reference_url https://github.com/dotnet/announcements/issues/277
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/dotnet/announcements/issues/277
50
reference_url https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73
51
reference_url https://github.com/eclipse/jetty.project/issues/10679
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/eclipse/jetty.project/issues/10679
52
reference_url https://github.com/envoyproxy/envoy/pull/30055
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/envoyproxy/envoy/pull/30055
53
reference_url https://github.com/etcd-io/etcd/issues/16740
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/etcd-io/etcd/issues/16740
54
reference_url https://github.com/facebook/proxygen/pull/466
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/facebook/proxygen/pull/466
55
reference_url https://github.com/golang/go/issues/63417
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/golang/go/issues/63417
56
reference_url https://github.com/grpc/grpc-go/pull/6703
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/grpc/grpc-go/pull/6703
57
reference_url https://github.com/grpc/grpc-go/releases
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/grpc/grpc-go/releases
58
reference_url https://github.com/grpc/grpc/releases/tag/v1.59.2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/grpc/grpc/releases/tag/v1.59.2
59
reference_url https://github.com/h2o/h2o/pull/3291
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/h2o/h2o/pull/3291
60
reference_url https://github.com/haproxy/haproxy/issues/2312
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/haproxy/haproxy/issues/2312
61
reference_url https://github.com/hyperium/hyper/issues/3337
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/hyperium/hyper/issues/3337
62
reference_url https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244
63
reference_url https://github.com/junkurihara/rust-rpxy/issues/97
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/junkurihara/rust-rpxy/issues/97
64
reference_url https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1
65
reference_url https://github.com/kazu-yamamoto/http2/issues/93
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/kazu-yamamoto/http2/issues/93
66
reference_url https://github.com/Kong/kong/discussions/11741
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/Kong/kong/discussions/11741
67
reference_url https://github.com/kubernetes/kubernetes/pull/121120
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/kubernetes/kubernetes/pull/121120
68
reference_url https://github.com/line/armeria/pull/5232
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/line/armeria/pull/5232
69
reference_url https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632
70
reference_url https://github.com/micrictor/http2-rst-stream
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/micrictor/http2-rst-stream
71
reference_url https://github.com/microsoft/CBL-Mariner/pull/6381
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/microsoft/CBL-Mariner/pull/6381
72
reference_url https://github.com/netty/netty
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/netty/netty
73
reference_url https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
74
reference_url https://github.com/nghttp2/nghttp2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nghttp2/nghttp2
75
reference_url https://github.com/nghttp2/nghttp2/commit/72b4af6143681f528f1d237b21a9a7aee1738832
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nghttp2/nghttp2/commit/72b4af6143681f528f1d237b21a9a7aee1738832
76
reference_url https://github.com/nghttp2/nghttp2/pull/1961
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/nghttp2/nghttp2/pull/1961
77
reference_url https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0
78
reference_url https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg
79
reference_url https://github.com/ninenines/cowboy/issues/1615
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/ninenines/cowboy/issues/1615
80
reference_url https://github.com/nodejs/node/pull/50121
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/nodejs/node/pull/50121
81
reference_url https://github.com/openresty/openresty/issues/930
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/openresty/openresty/issues/930
82
reference_url https://github.com/opensearch-project/data-prepper/issues/3474
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/opensearch-project/data-prepper/issues/3474
83
reference_url https://github.com/oqtane/oqtane.framework/discussions/3367
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/oqtane/oqtane.framework/discussions/3367
84
reference_url https://github.com/projectcontour/contour/pull/5826
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/projectcontour/contour/pull/5826
85
reference_url https://github.com/tempesta-tech/tempesta/issues/1986
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/tempesta-tech/tempesta/issues/1986
86
reference_url https://github.com/varnishcache/varnish-cache/issues/3996
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/varnishcache/varnish-cache/issues/3996
87
reference_url https://go.dev/cl/534215
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/534215
88
reference_url https://go.dev/cl/534235
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/534235
89
reference_url https://go.dev/issue/63417
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/63417
90
reference_url https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo
91
reference_url https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ
92
reference_url https://istio.io/latest/news/security/istio-security-2023-004
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://istio.io/latest/news/security/istio-security-2023-004
93
reference_url https://istio.io/latest/news/security/istio-security-2023-004/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://istio.io/latest/news/security/istio-security-2023-004/
94
reference_url https://linkerd.io/2023/10/12/linkerd-cve-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://linkerd.io/2023/10/12/linkerd-cve-2023-44487
95
reference_url https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/
96
reference_url https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
97
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
98
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html
99
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html
100
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html
101
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html
102
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html
103
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html
104
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
105
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
106
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
107
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
108
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
109
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
110
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
111
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
112
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
113
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
114
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
115
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
116
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
117
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
118
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ
119
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
120
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY
121
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
122
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
123
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
124
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
125
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
126
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
127
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
128
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
129
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
130
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
131
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
132
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
133
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
134
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
135
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
136
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
137
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
138
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
139
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
140
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
141
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
142
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3
143
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
144
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
145
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
146
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
147
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
148
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
149
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
150
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
151
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
152
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
153
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ
154
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
155
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY
156
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
157
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
158
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
159
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
160
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
161
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
162
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
163
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
164
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
165
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
166
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
167
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3
168
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
169
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
170
reference_url https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html
171
reference_url https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html
172
reference_url https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html
173
reference_url https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2
174
reference_url https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/
175
reference_url https://my.f5.com/manage/s/article/K000137106
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://my.f5.com/manage/s/article/K000137106
176
reference_url https://netty.io/news/2023/10/10/4-1-100-Final.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://netty.io/news/2023/10/10/4-1-100-Final.html
177
reference_url https://news.ycombinator.com/item?id=37830987
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://news.ycombinator.com/item?id=37830987
178
reference_url https://news.ycombinator.com/item?id=37830998
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://news.ycombinator.com/item?id=37830998
179
reference_url https://news.ycombinator.com/item?id=37831062
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://news.ycombinator.com/item?id=37831062
180
reference_url https://news.ycombinator.com/item?id=37837043
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://news.ycombinator.com/item?id=37837043
181
reference_url https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response
182
reference_url https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/
183
reference_url https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected
184
reference_url https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ
185
reference_url https://security.gentoo.org/glsa/202311-09
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.gentoo.org/glsa/202311-09
186
reference_url https://security.netapp.com/advisory/ntap-20231016-0001
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231016-0001
187
reference_url https://security.netapp.com/advisory/ntap-20231016-0001/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.netapp.com/advisory/ntap-20231016-0001/
188
reference_url https://security.netapp.com/advisory/ntap-20240426-0007
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240426-0007
189
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
190
reference_url https://security.netapp.com/advisory/ntap-20240621-0007
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0007
191
reference_url https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14
192
reference_url https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12
193
reference_url https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94
194
reference_url https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81
195
reference_url https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records
196
reference_url https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/
197
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487
198
reference_url https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
199
reference_url https://www.cve.org/CVERecord?id=CVE-2023-44487
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.cve.org/CVERecord?id=CVE-2023-44487
200
reference_url https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
201
reference_url https://www.debian.org/security/2023/dsa-5521
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5521
202
reference_url https://www.debian.org/security/2023/dsa-5522
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5522
203
reference_url https://www.debian.org/security/2023/dsa-5540
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5540
204
reference_url https://www.debian.org/security/2023/dsa-5549
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5549
205
reference_url https://www.debian.org/security/2023/dsa-5558
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5558
206
reference_url https://www.debian.org/security/2023/dsa-5570
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5570
207
reference_url https://www.eclipse.org/lists/jetty-announce/msg00181.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.eclipse.org/lists/jetty-announce/msg00181.html
208
reference_url https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
209
reference_url https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487
210
reference_url https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/
211
reference_url https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products
212
reference_url https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
213
reference_url https://www.openwall.com/lists/oss-security/2023/10/10/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.openwall.com/lists/oss-security/2023/10/10/6
214
reference_url https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack
215
reference_url https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday
216
reference_url https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/
217
reference_url https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause
218
reference_url http://www.openwall.com/lists/oss-security/2023/10/10/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/10/6
219
reference_url http://www.openwall.com/lists/oss-security/2023/10/10/7
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/10/7
220
reference_url http://www.openwall.com/lists/oss-security/2023/10/13/4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/13/4
221
reference_url http://www.openwall.com/lists/oss-security/2023/10/13/9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/13/9
222
reference_url http://www.openwall.com/lists/oss-security/2023/10/18/4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/18/4
223
reference_url http://www.openwall.com/lists/oss-security/2023/10/18/8
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/18/8
224
reference_url http://www.openwall.com/lists/oss-security/2023/10/19/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/19/6
225
reference_url http://www.openwall.com/lists/oss-security/2023/10/20/8
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/20/8
226
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053769
reference_id 1053769
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053769
227
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053770
reference_id 1053770
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053770
228
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053801
reference_id 1053801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053801
229
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054232
reference_id 1054232
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054232
230
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054234
reference_id 1054234
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054234
231
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056156
reference_id 1056156
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056156
232
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074421
reference_id 1074421
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074421
233
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
reference_id 2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
234
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
reference_id 3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
235
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
reference_id BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
236
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
reference_id CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
237
reference_url https://access.redhat.com/security/cve/cve-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://access.redhat.com/security/cve/cve-2023-44487
238
reference_url https://blog.vespa.ai/cve-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.vespa.ai/cve-2023-44487
239
reference_url https://blog.vespa.ai/cve-2023-44487/
reference_id CVE-2023-44487
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.vespa.ai/cve-2023-44487/
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487
241
reference_url https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
242
reference_url https://github.com/bcdannyboy/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/bcdannyboy/CVE-2023-44487
243
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52426.py
reference_id CVE-2023-44487
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52426.py
244
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
245
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-44487
246
reference_url https://security.paloaltonetworks.com/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.paloaltonetworks.com/CVE-2023-44487
247
reference_url https://ubuntu.com/security/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://ubuntu.com/security/CVE-2023-44487
248
reference_url https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack
reference_id CVE-2023-44487-HTTP-2-RAPID-RESET-ATTACK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack
249
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
reference_id E72T67UPDRXHIDLO3OROR25YAMN4GGW5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
250
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
reference_id FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
251
reference_url https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf
reference_id GHSA-2m7v-gc89-fjqf
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf
252
reference_url https://github.com/advisories/GHSA-qppj-fm5r-hxr3
reference_id GHSA-qppj-fm5r-hxr3
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/advisories/GHSA-qppj-fm5r-hxr3
253
reference_url https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3
reference_id GHSA-qppj-fm5r-hxr3
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
4
value HIGH
scoring_system generic_textual
scoring_elements
5
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3
254
reference_url https://github.com/advisories/GHSA-vx74-f528-fxqg
reference_id GHSA-vx74-f528-fxqg
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/advisories/GHSA-vx74-f528-fxqg
255
reference_url https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
reference_id GHSA-xpw8-rcwv-8f8p
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
256
reference_url https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p
reference_id GHSA-xpw8-rcwv-8f8p
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p
257
reference_url https://security.gentoo.org/glsa/202408-10
reference_id GLSA-202408-10
reference_type
scores
url https://security.gentoo.org/glsa/202408-10
258
reference_url https://security.gentoo.org/glsa/202412-14
reference_id GLSA-202412-14
reference_type
scores
url https://security.gentoo.org/glsa/202412-14
259
reference_url https://security.gentoo.org/glsa/202505-11
reference_id GLSA-202505-11
reference_type
scores
url https://security.gentoo.org/glsa/202505-11
260
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
reference_id HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
261
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
reference_id KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
262
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
reference_id LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
263
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
reference_id LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
264
reference_url https://security.netapp.com/advisory/ntap-20240426-0007/
reference_id ntap-20240426-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.netapp.com/advisory/ntap-20240426-0007/
265
reference_url https://security.netapp.com/advisory/ntap-20240621-0007/
reference_id ntap-20240621-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.netapp.com/advisory/ntap-20240621-0007/
266
reference_url https://access.redhat.com/errata/RHSA-2023:5006
reference_id RHSA-2023:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5006
267
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
268
reference_url https://access.redhat.com/errata/RHSA-2023:5530
reference_id RHSA-2023:5530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5530
269
reference_url https://access.redhat.com/errata/RHSA-2023:5541
reference_id RHSA-2023:5541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5541
270
reference_url https://access.redhat.com/errata/RHSA-2023:5542
reference_id RHSA-2023:5542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5542
271
reference_url https://access.redhat.com/errata/RHSA-2023:5679
reference_id RHSA-2023:5679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5679
272
reference_url https://access.redhat.com/errata/RHSA-2023:5705
reference_id RHSA-2023:5705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5705
273
reference_url https://access.redhat.com/errata/RHSA-2023:5706
reference_id RHSA-2023:5706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5706
274
reference_url https://access.redhat.com/errata/RHSA-2023:5707
reference_id RHSA-2023:5707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5707
275
reference_url https://access.redhat.com/errata/RHSA-2023:5708
reference_id RHSA-2023:5708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5708
276
reference_url https://access.redhat.com/errata/RHSA-2023:5709
reference_id RHSA-2023:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5709
277
reference_url https://access.redhat.com/errata/RHSA-2023:5710
reference_id RHSA-2023:5710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5710
278
reference_url https://access.redhat.com/errata/RHSA-2023:5711
reference_id RHSA-2023:5711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5711
279
reference_url https://access.redhat.com/errata/RHSA-2023:5712
reference_id RHSA-2023:5712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5712
280
reference_url https://access.redhat.com/errata/RHSA-2023:5713
reference_id RHSA-2023:5713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5713
281
reference_url https://access.redhat.com/errata/RHSA-2023:5714
reference_id RHSA-2023:5714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5714
282
reference_url https://access.redhat.com/errata/RHSA-2023:5715
reference_id RHSA-2023:5715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5715
283
reference_url https://access.redhat.com/errata/RHSA-2023:5716
reference_id RHSA-2023:5716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5716
284
reference_url https://access.redhat.com/errata/RHSA-2023:5717
reference_id RHSA-2023:5717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5717
285
reference_url https://access.redhat.com/errata/RHSA-2023:5719
reference_id RHSA-2023:5719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5719
286
reference_url https://access.redhat.com/errata/RHSA-2023:5720
reference_id RHSA-2023:5720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5720
287
reference_url https://access.redhat.com/errata/RHSA-2023:5721
reference_id RHSA-2023:5721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5721
288
reference_url https://access.redhat.com/errata/RHSA-2023:5724
reference_id RHSA-2023:5724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5724
289
reference_url https://access.redhat.com/errata/RHSA-2023:5738
reference_id RHSA-2023:5738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5738
290
reference_url https://access.redhat.com/errata/RHSA-2023:5749
reference_id RHSA-2023:5749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5749
291
reference_url https://access.redhat.com/errata/RHSA-2023:5764
reference_id RHSA-2023:5764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5764
292
reference_url https://access.redhat.com/errata/RHSA-2023:5765
reference_id RHSA-2023:5765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5765
293
reference_url https://access.redhat.com/errata/RHSA-2023:5766
reference_id RHSA-2023:5766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5766
294
reference_url https://access.redhat.com/errata/RHSA-2023:5767
reference_id RHSA-2023:5767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5767
295
reference_url https://access.redhat.com/errata/RHSA-2023:5768
reference_id RHSA-2023:5768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5768
296
reference_url https://access.redhat.com/errata/RHSA-2023:5769
reference_id RHSA-2023:5769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5769
297
reference_url https://access.redhat.com/errata/RHSA-2023:5770
reference_id RHSA-2023:5770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5770
298
reference_url https://access.redhat.com/errata/RHSA-2023:5780
reference_id RHSA-2023:5780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5780
299
reference_url https://access.redhat.com/errata/RHSA-2023:5783
reference_id RHSA-2023:5783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5783
300
reference_url https://access.redhat.com/errata/RHSA-2023:5784
reference_id RHSA-2023:5784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5784
301
reference_url https://access.redhat.com/errata/RHSA-2023:5801
reference_id RHSA-2023:5801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5801
302
reference_url https://access.redhat.com/errata/RHSA-2023:5802
reference_id RHSA-2023:5802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5802
303
reference_url https://access.redhat.com/errata/RHSA-2023:5803
reference_id RHSA-2023:5803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5803
304
reference_url https://access.redhat.com/errata/RHSA-2023:5805
reference_id RHSA-2023:5805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5805
305
reference_url https://access.redhat.com/errata/RHSA-2023:5835
reference_id RHSA-2023:5835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5835
306
reference_url https://access.redhat.com/errata/RHSA-2023:5837
reference_id RHSA-2023:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5837
307
reference_url https://access.redhat.com/errata/RHSA-2023:5838
reference_id RHSA-2023:5838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5838
308
reference_url https://access.redhat.com/errata/RHSA-2023:5840
reference_id RHSA-2023:5840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5840
309
reference_url https://access.redhat.com/errata/RHSA-2023:5841
reference_id RHSA-2023:5841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5841
310
reference_url https://access.redhat.com/errata/RHSA-2023:5849
reference_id RHSA-2023:5849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5849
311
reference_url https://access.redhat.com/errata/RHSA-2023:5850
reference_id RHSA-2023:5850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5850
312
reference_url https://access.redhat.com/errata/RHSA-2023:5851
reference_id RHSA-2023:5851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5851
313
reference_url https://access.redhat.com/errata/RHSA-2023:5863
reference_id RHSA-2023:5863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5863
314
reference_url https://access.redhat.com/errata/RHSA-2023:5864
reference_id RHSA-2023:5864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5864
315
reference_url https://access.redhat.com/errata/RHSA-2023:5865
reference_id RHSA-2023:5865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5865
316
reference_url https://access.redhat.com/errata/RHSA-2023:5866
reference_id RHSA-2023:5866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5866
317
reference_url https://access.redhat.com/errata/RHSA-2023:5867
reference_id RHSA-2023:5867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5867
318
reference_url https://access.redhat.com/errata/RHSA-2023:5869
reference_id RHSA-2023:5869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5869
319
reference_url https://access.redhat.com/errata/RHSA-2023:5896
reference_id RHSA-2023:5896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5896
320
reference_url https://access.redhat.com/errata/RHSA-2023:5902
reference_id RHSA-2023:5902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5902
321
reference_url https://access.redhat.com/errata/RHSA-2023:5920
reference_id RHSA-2023:5920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5920
322
reference_url https://access.redhat.com/errata/RHSA-2023:5922
reference_id RHSA-2023:5922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5922
323
reference_url https://access.redhat.com/errata/RHSA-2023:5924
reference_id RHSA-2023:5924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5924
324
reference_url https://access.redhat.com/errata/RHSA-2023:5928
reference_id RHSA-2023:5928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5928
325
reference_url https://access.redhat.com/errata/RHSA-2023:5929
reference_id RHSA-2023:5929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5929
326
reference_url https://access.redhat.com/errata/RHSA-2023:5930
reference_id RHSA-2023:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5930
327
reference_url https://access.redhat.com/errata/RHSA-2023:5931
reference_id RHSA-2023:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5931
328
reference_url https://access.redhat.com/errata/RHSA-2023:5933
reference_id RHSA-2023:5933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5933
329
reference_url https://access.redhat.com/errata/RHSA-2023:5935
reference_id RHSA-2023:5935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5935
330
reference_url https://access.redhat.com/errata/RHSA-2023:5945
reference_id RHSA-2023:5945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5945
331
reference_url https://access.redhat.com/errata/RHSA-2023:5946
reference_id RHSA-2023:5946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5946
332
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
333
reference_url https://access.redhat.com/errata/RHSA-2023:5956
reference_id RHSA-2023:5956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5956
334
reference_url https://access.redhat.com/errata/RHSA-2023:5964
reference_id RHSA-2023:5964
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5964
335
reference_url https://access.redhat.com/errata/RHSA-2023:5965
reference_id RHSA-2023:5965
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5965
336
reference_url https://access.redhat.com/errata/RHSA-2023:5967
reference_id RHSA-2023:5967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5967
337
reference_url https://access.redhat.com/errata/RHSA-2023:5969
reference_id RHSA-2023:5969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5969
338
reference_url https://access.redhat.com/errata/RHSA-2023:5970
reference_id RHSA-2023:5970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5970
339
reference_url https://access.redhat.com/errata/RHSA-2023:5971
reference_id RHSA-2023:5971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5971
340
reference_url https://access.redhat.com/errata/RHSA-2023:5973
reference_id RHSA-2023:5973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5973
341
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
342
reference_url https://access.redhat.com/errata/RHSA-2023:5976
reference_id RHSA-2023:5976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5976
343
reference_url https://access.redhat.com/errata/RHSA-2023:5978
reference_id RHSA-2023:5978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5978
344
reference_url https://access.redhat.com/errata/RHSA-2023:5979
reference_id RHSA-2023:5979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5979
345
reference_url https://access.redhat.com/errata/RHSA-2023:5980
reference_id RHSA-2023:5980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5980
346
reference_url https://access.redhat.com/errata/RHSA-2023:5982
reference_id RHSA-2023:5982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5982
347
reference_url https://access.redhat.com/errata/RHSA-2023:5989
reference_id RHSA-2023:5989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5989
348
reference_url https://access.redhat.com/errata/RHSA-2023:6020
reference_id RHSA-2023:6020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6020
349
reference_url https://access.redhat.com/errata/RHSA-2023:6021
reference_id RHSA-2023:6021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6021
350
reference_url https://access.redhat.com/errata/RHSA-2023:6022
reference_id RHSA-2023:6022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6022
351
reference_url https://access.redhat.com/errata/RHSA-2023:6023
reference_id RHSA-2023:6023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6023
352
reference_url https://access.redhat.com/errata/RHSA-2023:6030
reference_id RHSA-2023:6030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6030
353
reference_url https://access.redhat.com/errata/RHSA-2023:6031
reference_id RHSA-2023:6031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6031
354
reference_url https://access.redhat.com/errata/RHSA-2023:6039
reference_id RHSA-2023:6039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6039
355
reference_url https://access.redhat.com/errata/RHSA-2023:6040
reference_id RHSA-2023:6040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6040
356
reference_url https://access.redhat.com/errata/RHSA-2023:6041
reference_id RHSA-2023:6041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6041
357
reference_url https://access.redhat.com/errata/RHSA-2023:6042
reference_id RHSA-2023:6042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6042
358
reference_url https://access.redhat.com/errata/RHSA-2023:6048
reference_id RHSA-2023:6048
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6048
359
reference_url https://access.redhat.com/errata/RHSA-2023:6057
reference_id RHSA-2023:6057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6057
360
reference_url https://access.redhat.com/errata/RHSA-2023:6059
reference_id RHSA-2023:6059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6059
361
reference_url https://access.redhat.com/errata/RHSA-2023:6061
reference_id RHSA-2023:6061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6061
362
reference_url https://access.redhat.com/errata/RHSA-2023:6077
reference_id RHSA-2023:6077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6077
363
reference_url https://access.redhat.com/errata/RHSA-2023:6079
reference_id RHSA-2023:6079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6079
364
reference_url https://access.redhat.com/errata/RHSA-2023:6080
reference_id RHSA-2023:6080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6080
365
reference_url https://access.redhat.com/errata/RHSA-2023:6084
reference_id RHSA-2023:6084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6084
366
reference_url https://access.redhat.com/errata/RHSA-2023:6105
reference_id RHSA-2023:6105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6105
367
reference_url https://access.redhat.com/errata/RHSA-2023:6106
reference_id RHSA-2023:6106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6106
368
reference_url https://access.redhat.com/errata/RHSA-2023:6114
reference_id RHSA-2023:6114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6114
369
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
370
reference_url https://access.redhat.com/errata/RHSA-2023:6117
reference_id RHSA-2023:6117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6117
371
reference_url https://access.redhat.com/errata/RHSA-2023:6118
reference_id RHSA-2023:6118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6118
372
reference_url https://access.redhat.com/errata/RHSA-2023:6120
reference_id RHSA-2023:6120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6120
373
reference_url https://access.redhat.com/errata/RHSA-2023:6129
reference_id RHSA-2023:6129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6129
374
reference_url https://access.redhat.com/errata/RHSA-2023:6137
reference_id RHSA-2023:6137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6137
375
reference_url https://access.redhat.com/errata/RHSA-2023:6144
reference_id RHSA-2023:6144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6144
376
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
377
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
378
reference_url https://access.redhat.com/errata/RHSA-2023:6165
reference_id RHSA-2023:6165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6165
379
reference_url https://access.redhat.com/errata/RHSA-2023:6179
reference_id RHSA-2023:6179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6179
380
reference_url https://access.redhat.com/errata/RHSA-2023:6217
reference_id RHSA-2023:6217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6217
381
reference_url https://access.redhat.com/errata/RHSA-2023:6233
reference_id RHSA-2023:6233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6233
382
reference_url https://access.redhat.com/errata/RHSA-2023:6235
reference_id RHSA-2023:6235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6235
383
reference_url https://access.redhat.com/errata/RHSA-2023:6239
reference_id RHSA-2023:6239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6239
384
reference_url https://access.redhat.com/errata/RHSA-2023:6248
reference_id RHSA-2023:6248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6248
385
reference_url https://access.redhat.com/errata/RHSA-2023:6251
reference_id RHSA-2023:6251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6251
386
reference_url https://access.redhat.com/errata/RHSA-2023:6269
reference_id RHSA-2023:6269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6269
387
reference_url https://access.redhat.com/errata/RHSA-2023:6272
reference_id RHSA-2023:6272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6272
388
reference_url https://access.redhat.com/errata/RHSA-2023:6280
reference_id RHSA-2023:6280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6280
389
reference_url https://access.redhat.com/errata/RHSA-2023:6286
reference_id RHSA-2023:6286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6286
390
reference_url https://access.redhat.com/errata/RHSA-2023:6296
reference_id RHSA-2023:6296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6296
391
reference_url https://access.redhat.com/errata/RHSA-2023:6298
reference_id RHSA-2023:6298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6298
392
reference_url https://access.redhat.com/errata/RHSA-2023:6305
reference_id RHSA-2023:6305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6305
393
reference_url https://access.redhat.com/errata/RHSA-2023:6746
reference_id RHSA-2023:6746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6746
394
reference_url https://access.redhat.com/errata/RHSA-2023:6779
reference_id RHSA-2023:6779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6779
395
reference_url https://access.redhat.com/errata/RHSA-2023:6781
reference_id RHSA-2023:6781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6781
396
reference_url https://access.redhat.com/errata/RHSA-2023:6782
reference_id RHSA-2023:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6782
397
reference_url https://access.redhat.com/errata/RHSA-2023:6783
reference_id RHSA-2023:6783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6783
398
reference_url https://access.redhat.com/errata/RHSA-2023:6784
reference_id RHSA-2023:6784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6784
399
reference_url https://access.redhat.com/errata/RHSA-2023:6785
reference_id RHSA-2023:6785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6785
400
reference_url https://access.redhat.com/errata/RHSA-2023:6786
reference_id RHSA-2023:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6786
401
reference_url https://access.redhat.com/errata/RHSA-2023:6787
reference_id RHSA-2023:6787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6787
402
reference_url https://access.redhat.com/errata/RHSA-2023:6788
reference_id RHSA-2023:6788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6788
403
reference_url https://access.redhat.com/errata/RHSA-2023:6817
reference_id RHSA-2023:6817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6817
404
reference_url https://access.redhat.com/errata/RHSA-2023:6818
reference_id RHSA-2023:6818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6818
405
reference_url https://access.redhat.com/errata/RHSA-2023:6832
reference_id RHSA-2023:6832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6832
406
reference_url https://access.redhat.com/errata/RHSA-2023:6836
reference_id RHSA-2023:6836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6836
407
reference_url https://access.redhat.com/errata/RHSA-2023:6837
reference_id RHSA-2023:6837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6837
408
reference_url https://access.redhat.com/errata/RHSA-2023:6839
reference_id RHSA-2023:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6839
409
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
410
reference_url https://access.redhat.com/errata/RHSA-2023:7198
reference_id RHSA-2023:7198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7198
411
reference_url https://access.redhat.com/errata/RHSA-2023:7205
reference_id RHSA-2023:7205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7205
412
reference_url https://access.redhat.com/errata/RHSA-2023:7215
reference_id RHSA-2023:7215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7215
413
reference_url https://access.redhat.com/errata/RHSA-2023:7218
reference_id RHSA-2023:7218
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7218
414
reference_url https://access.redhat.com/errata/RHSA-2023:7288
reference_id RHSA-2023:7288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7288
415
reference_url https://access.redhat.com/errata/RHSA-2023:7315
reference_id RHSA-2023:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7315
416
reference_url https://access.redhat.com/errata/RHSA-2023:7325
reference_id RHSA-2023:7325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7325
417
reference_url https://access.redhat.com/errata/RHSA-2023:7334
reference_id RHSA-2023:7334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7334
418
reference_url https://access.redhat.com/errata/RHSA-2023:7335
reference_id RHSA-2023:7335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7335
419
reference_url https://access.redhat.com/errata/RHSA-2023:7344
reference_id RHSA-2023:7344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7344
420
reference_url https://access.redhat.com/errata/RHSA-2023:7345
reference_id RHSA-2023:7345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7345
421
reference_url https://access.redhat.com/errata/RHSA-2023:7481
reference_id RHSA-2023:7481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7481
422
reference_url https://access.redhat.com/errata/RHSA-2023:7482
reference_id RHSA-2023:7482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7482
423
reference_url https://access.redhat.com/errata/RHSA-2023:7483
reference_id RHSA-2023:7483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7483
424
reference_url https://access.redhat.com/errata/RHSA-2023:7484
reference_id RHSA-2023:7484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7484
425
reference_url https://access.redhat.com/errata/RHSA-2023:7486
reference_id RHSA-2023:7486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7486
426
reference_url https://access.redhat.com/errata/RHSA-2023:7488
reference_id RHSA-2023:7488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7488
427
reference_url https://access.redhat.com/errata/RHSA-2023:7521
reference_id RHSA-2023:7521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7521
428
reference_url https://access.redhat.com/errata/RHSA-2023:7522
reference_id RHSA-2023:7522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7522
429
reference_url https://access.redhat.com/errata/RHSA-2023:7555
reference_id RHSA-2023:7555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7555
430
reference_url https://access.redhat.com/errata/RHSA-2023:7587
reference_id RHSA-2023:7587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7587
431
reference_url https://access.redhat.com/errata/RHSA-2023:7610
reference_id RHSA-2023:7610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7610
432
reference_url https://access.redhat.com/errata/RHSA-2023:7682
reference_id RHSA-2023:7682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7682
433
reference_url https://access.redhat.com/errata/RHSA-2023:7687
reference_id RHSA-2023:7687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7687
434
reference_url https://access.redhat.com/errata/RHSA-2023:7699
reference_id RHSA-2023:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7699
435
reference_url https://access.redhat.com/errata/RHSA-2023:7703
reference_id RHSA-2023:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7703
436
reference_url https://access.redhat.com/errata/RHSA-2023:7704
reference_id RHSA-2023:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7704
437
reference_url https://access.redhat.com/errata/RHSA-2023:7741
reference_id RHSA-2023:7741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7741
438
reference_url https://access.redhat.com/errata/RHSA-2024:0269
reference_id RHSA-2024:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0269
439
reference_url https://access.redhat.com/errata/RHSA-2024:0302
reference_id RHSA-2024:0302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0302
440
reference_url https://access.redhat.com/errata/RHSA-2024:0777
reference_id RHSA-2024:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0777
441
reference_url https://access.redhat.com/errata/RHSA-2024:1444
reference_id RHSA-2024:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1444
442
reference_url https://access.redhat.com/errata/RHSA-2024:1770
reference_id RHSA-2024:1770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1770
443
reference_url https://access.redhat.com/errata/RHSA-2024:2633
reference_id RHSA-2024:2633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2633
444
reference_url https://access.redhat.com/errata/RHSA-2024:4631
reference_id RHSA-2024:4631
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4631
445
reference_url https://access.redhat.com/errata/RHSA-2025:16668
reference_id RHSA-2025:16668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16668
446
reference_url https://usn.ubuntu.com/6427-1/
reference_id USN-6427-1
reference_type
scores
url https://usn.ubuntu.com/6427-1/
447
reference_url https://usn.ubuntu.com/6427-2/
reference_id USN-6427-2
reference_type
scores
url https://usn.ubuntu.com/6427-2/
448
reference_url https://usn.ubuntu.com/6438-1/
reference_id USN-6438-1
reference_type
scores
url https://usn.ubuntu.com/6438-1/
449
reference_url https://usn.ubuntu.com/6505-1/
reference_id USN-6505-1
reference_type
scores
url https://usn.ubuntu.com/6505-1/
450
reference_url https://usn.ubuntu.com/6574-1/
reference_id USN-6574-1
reference_type
scores
url https://usn.ubuntu.com/6574-1/
451
reference_url https://usn.ubuntu.com/6754-1/
reference_id USN-6754-1
reference_type
scores
url https://usn.ubuntu.com/6754-1/
452
reference_url https://usn.ubuntu.com/6994-1/
reference_id USN-6994-1
reference_type
scores
url https://usn.ubuntu.com/6994-1/
453
reference_url https://usn.ubuntu.com/7067-1/
reference_id USN-7067-1
reference_type
scores
url https://usn.ubuntu.com/7067-1/
454
reference_url https://usn.ubuntu.com/7410-1/
reference_id USN-7410-1
reference_type
scores
url https://usn.ubuntu.com/7410-1/
455
reference_url https://usn.ubuntu.com/7469-1/
reference_id USN-7469-1
reference_type
scores
url https://usn.ubuntu.com/7469-1/
456
reference_url https://usn.ubuntu.com/7469-2/
reference_id USN-7469-2
reference_type
scores
url https://usn.ubuntu.com/7469-2/
457
reference_url https://usn.ubuntu.com/7469-3/
reference_id USN-7469-3
reference_type
scores
url https://usn.ubuntu.com/7469-3/
458
reference_url https://usn.ubuntu.com/7469-4/
reference_id USN-7469-4
reference_type
scores
url https://usn.ubuntu.com/7469-4/
459
reference_url https://usn.ubuntu.com/7892-1/
reference_id USN-7892-1
reference_type
scores
url https://usn.ubuntu.com/7892-1/
460
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
reference_id VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
461
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
reference_id VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
462
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
reference_id WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
463
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
reference_id WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
464
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
reference_id X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
465
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
reference_id XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
466
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
reference_id ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
467
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
reference_id ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-44487, GHSA-2m7v-gc89-fjqf, GHSA-qppj-fm5r-hxr3, GHSA-vx74-f528-fxqg, GHSA-xpw8-rcwv-8f8p, GMS-2023-3377, VSV00013
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5781-s1ny-q7ey
6
url VCID-6bwv-cd3d-mudb
vulnerability_id VCID-6bwv-cd3d-mudb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17559
reference_id
reference_type
scores
0
value 0.01409
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-21T12:55:00Z
1
value 0.01409
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-18T12:55:00Z
2
value 0.01409
scoring_system epss
scoring_elements 0.80433
published_at 2026-04-01T12:55:00Z
3
value 0.01409
scoring_system epss
scoring_elements 0.80439
published_at 2026-04-02T12:55:00Z
4
value 0.01409
scoring_system epss
scoring_elements 0.8046
published_at 2026-04-04T12:55:00Z
5
value 0.01409
scoring_system epss
scoring_elements 0.80449
published_at 2026-04-07T12:55:00Z
6
value 0.01409
scoring_system epss
scoring_elements 0.80478
published_at 2026-04-08T12:55:00Z
7
value 0.01409
scoring_system epss
scoring_elements 0.80488
published_at 2026-04-09T12:55:00Z
8
value 0.01409
scoring_system epss
scoring_elements 0.80506
published_at 2026-04-11T12:55:00Z
9
value 0.01409
scoring_system epss
scoring_elements 0.80492
published_at 2026-04-12T12:55:00Z
10
value 0.01409
scoring_system epss
scoring_elements 0.80484
published_at 2026-04-13T12:55:00Z
11
value 0.01409
scoring_system epss
scoring_elements 0.80513
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17559
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17559
reference_id CVE-2019-17559
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17559
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-17559
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bwv-cd3d-mudb
7
url VCID-73aa-rk27-tye1
vulnerability_id VCID-73aa-rk27-tye1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37392
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63882
published_at 2026-04-04T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63855
published_at 2026-04-02T12:55:00Z
2
value 0.00615
scoring_system epss
scoring_elements 0.69892
published_at 2026-04-09T12:55:00Z
3
value 0.00615
scoring_system epss
scoring_elements 0.69828
published_at 2026-04-07T12:55:00Z
4
value 0.00615
scoring_system epss
scoring_elements 0.69876
published_at 2026-04-08T12:55:00Z
5
value 0.00615
scoring_system epss
scoring_elements 0.69914
published_at 2026-04-11T12:55:00Z
6
value 0.03006
scoring_system epss
scoring_elements 0.86581
published_at 2026-04-13T12:55:00Z
7
value 0.03006
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-21T12:55:00Z
8
value 0.03006
scoring_system epss
scoring_elements 0.86588
published_at 2026-04-12T12:55:00Z
9
value 0.03006
scoring_system epss
scoring_elements 0.86594
published_at 2026-04-16T12:55:00Z
10
value 0.03006
scoring_system epss
scoring_elements 0.86599
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37392
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392
3
reference_url https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
reference_id mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-17T14:20:03Z/
url https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-37392
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73aa-rk27-tye1
8
url VCID-7nhc-5p2x-t3cj
vulnerability_id VCID-7nhc-5p2x-t3cj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25763
reference_id
reference_type
scores
0
value 0.00438
scoring_system epss
scoring_elements 0.6313
published_at 2026-04-21T12:55:00Z
1
value 0.00438
scoring_system epss
scoring_elements 0.63109
published_at 2026-04-08T12:55:00Z
2
value 0.00438
scoring_system epss
scoring_elements 0.63126
published_at 2026-04-09T12:55:00Z
3
value 0.00438
scoring_system epss
scoring_elements 0.63143
published_at 2026-04-11T12:55:00Z
4
value 0.00438
scoring_system epss
scoring_elements 0.63128
published_at 2026-04-12T12:55:00Z
5
value 0.00438
scoring_system epss
scoring_elements 0.63106
published_at 2026-04-13T12:55:00Z
6
value 0.00438
scoring_system epss
scoring_elements 0.63142
published_at 2026-04-16T12:55:00Z
7
value 0.00438
scoring_system epss
scoring_elements 0.63149
published_at 2026-04-18T12:55:00Z
8
value 0.00438
scoring_system epss
scoring_elements 0.63064
published_at 2026-04-02T12:55:00Z
9
value 0.00438
scoring_system epss
scoring_elements 0.63093
published_at 2026-04-04T12:55:00Z
10
value 0.00438
scoring_system epss
scoring_elements 0.63057
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25763
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
reference_id CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
8
reference_url https://www.debian.org/security/2022/dsa-5206
reference_id dsa-5206
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/
url https://www.debian.org/security/2022/dsa-5206
9
reference_url https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
reference_id rc64lwbdgrkv674koc3zl1sljr9vwg21
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/
url https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
reference_id ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-25763
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nhc-5p2x-t3cj
9
url VCID-8aev-nmwa-fkcg
vulnerability_id VCID-8aev-nmwa-fkcg
summary A carefully crafted invalid TLS handshake can cause Apache Traffic Server (ATS) to segfault. This affects version 6.2.2. To resolve this issue users running 6.2.2 should upgrade to 6.2.3 or later versions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8022
reference_id
reference_type
scores
0
value 0.06136
scoring_system epss
scoring_elements 0.90763
published_at 2026-04-01T12:55:00Z
1
value 0.06136
scoring_system epss
scoring_elements 0.90769
published_at 2026-04-02T12:55:00Z
2
value 0.06136
scoring_system epss
scoring_elements 0.9078
published_at 2026-04-04T12:55:00Z
3
value 0.06136
scoring_system epss
scoring_elements 0.90791
published_at 2026-04-07T12:55:00Z
4
value 0.06136
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-08T12:55:00Z
5
value 0.06136
scoring_system epss
scoring_elements 0.90808
published_at 2026-04-09T12:55:00Z
6
value 0.06136
scoring_system epss
scoring_elements 0.90817
published_at 2026-04-12T12:55:00Z
7
value 0.06136
scoring_system epss
scoring_elements 0.90815
published_at 2026-04-13T12:55:00Z
8
value 0.06136
scoring_system epss
scoring_elements 0.90834
published_at 2026-04-16T12:55:00Z
9
value 0.06136
scoring_system epss
scoring_elements 0.90832
published_at 2026-04-18T12:55:00Z
10
value 0.06136
scoring_system epss
scoring_elements 0.90831
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8022
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8022
fixed_packages
0
url pkg:deb/debian/trafficserver@7.0.0-4~bpo8%2B1
purl pkg:deb/debian/trafficserver@7.0.0-4~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-au6q-ek7r-8bgr
11
vulnerability VCID-b7zx-ywwc-57d9
12
vulnerability VCID-bb5y-kjej-bbfm
13
vulnerability VCID-bdgg-edbf-xfav
14
vulnerability VCID-btm9-vxvc-3qhv
15
vulnerability VCID-c5hc-3jtx-k3a6
16
vulnerability VCID-c675-5njd-63hk
17
vulnerability VCID-cbe5-hhz8-bqbn
18
vulnerability VCID-cscf-sb71-jybq
19
vulnerability VCID-esap-nkps-cfg9
20
vulnerability VCID-fmwc-nmhh-ryaf
21
vulnerability VCID-fq5y-b9yq-nbee
22
vulnerability VCID-hbte-dsw2-y7ad
23
vulnerability VCID-j6r7-ypa1-zybv
24
vulnerability VCID-jabw-thzt-63bb
25
vulnerability VCID-jb1b-9gr2-suez
26
vulnerability VCID-jdjf-3w9k-xbaw
27
vulnerability VCID-k2ks-3t6e-uqgu
28
vulnerability VCID-msu4-5h99-2yaq
29
vulnerability VCID-n66u-b73u-zucb
30
vulnerability VCID-nbwy-fdv2-uydt
31
vulnerability VCID-p5f7-uu6r-8bez
32
vulnerability VCID-pxaf-6qxa-77h9
33
vulnerability VCID-qwmj-ez4q-7qex
34
vulnerability VCID-r86j-zujn-f7ez
35
vulnerability VCID-rcdg-j23x-xfbn
36
vulnerability VCID-rw58-bnwt-2bam
37
vulnerability VCID-skrs-cynm-r7du
38
vulnerability VCID-t559-a5u6-4ke1
39
vulnerability VCID-u5qg-vszr-9ye2
40
vulnerability VCID-ue7s-pn8b-vydz
41
vulnerability VCID-uhqf-tsxe-ayc2
42
vulnerability VCID-uhxq-9bzs-u3fd
43
vulnerability VCID-uy1m-av2n-jybt
44
vulnerability VCID-va7d-ktp2-m7et
45
vulnerability VCID-w42s-4aps-y3c5
46
vulnerability VCID-waer-as81-8fed
47
vulnerability VCID-xh97-4sn5-vyfw
48
vulnerability VCID-xwdc-hndy-yubc
49
vulnerability VCID-xwru-y5m9-gucd
50
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@7.0.0-4~bpo8%252B1
aliases CVE-2018-8022
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8aev-nmwa-fkcg
10
url VCID-931v-ukcc-6qaa
vulnerability_id VCID-931v-ukcc-6qaa
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44040
reference_id
reference_type
scores
0
value 0.0325
scoring_system epss
scoring_elements 0.87067
published_at 2026-04-01T12:55:00Z
1
value 0.0325
scoring_system epss
scoring_elements 0.87078
published_at 2026-04-02T12:55:00Z
2
value 0.0325
scoring_system epss
scoring_elements 0.87096
published_at 2026-04-04T12:55:00Z
3
value 0.0325
scoring_system epss
scoring_elements 0.87089
published_at 2026-04-07T12:55:00Z
4
value 0.0325
scoring_system epss
scoring_elements 0.8711
published_at 2026-04-08T12:55:00Z
5
value 0.0325
scoring_system epss
scoring_elements 0.87117
published_at 2026-04-09T12:55:00Z
6
value 0.0325
scoring_system epss
scoring_elements 0.8713
published_at 2026-04-11T12:55:00Z
7
value 0.0325
scoring_system epss
scoring_elements 0.87125
published_at 2026-04-12T12:55:00Z
8
value 0.0325
scoring_system epss
scoring_elements 0.8712
published_at 2026-04-13T12:55:00Z
9
value 0.0325
scoring_system epss
scoring_elements 0.87136
published_at 2026-04-21T12:55:00Z
10
value 0.0325
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-44040
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-931v-ukcc-6qaa
11
url VCID-9pd6-v7d1-9qem
vulnerability_id VCID-9pd6-v7d1-9qem
summary The HTTP/2 experimental feature in Apache Traffic Server 5.3.x before 5.3.1 allows remote attackers to cause a denial of service (out-of-bounds access and daemon crash) or possibly execute arbitrary code via vectors related to the (1) frame_handlers array or (2) set_dynamic_table_size function.
references
0
reference_url http://mail-archives.us.apache.org/mod_mbox/www-announce/201507.mbox/%3CCABF6JR37mWzDmXDqRQwRUXiojBZrhidndnsY1ZgmcZv-o7-a+g%40mail.gmail.com%3E
reference_id
reference_type
scores
url http://mail-archives.us.apache.org/mod_mbox/www-announce/201507.mbox/%3CCABF6JR37mWzDmXDqRQwRUXiojBZrhidndnsY1ZgmcZv-o7-a+g%40mail.gmail.com%3E
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3249
reference_id
reference_type
scores
0
value 0.04233
scoring_system epss
scoring_elements 0.88788
published_at 2026-04-21T12:55:00Z
1
value 0.04233
scoring_system epss
scoring_elements 0.8879
published_at 2026-04-18T12:55:00Z
2
value 0.04233
scoring_system epss
scoring_elements 0.88723
published_at 2026-04-01T12:55:00Z
3
value 0.04233
scoring_system epss
scoring_elements 0.88732
published_at 2026-04-02T12:55:00Z
4
value 0.04233
scoring_system epss
scoring_elements 0.88748
published_at 2026-04-04T12:55:00Z
5
value 0.04233
scoring_system epss
scoring_elements 0.8875
published_at 2026-04-07T12:55:00Z
6
value 0.04233
scoring_system epss
scoring_elements 0.88767
published_at 2026-04-08T12:55:00Z
7
value 0.04233
scoring_system epss
scoring_elements 0.88772
published_at 2026-04-09T12:55:00Z
8
value 0.04233
scoring_system epss
scoring_elements 0.88784
published_at 2026-04-11T12:55:00Z
9
value 0.04233
scoring_system epss
scoring_elements 0.88778
published_at 2026-04-12T12:55:00Z
10
value 0.04233
scoring_system epss
scoring_elements 0.88779
published_at 2026-04-13T12:55:00Z
11
value 0.04233
scoring_system epss
scoring_elements 0.88792
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3249
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3249
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3249
3
reference_url https://yahoo-security.tumblr.com/post/122883273670/apache-traffic-server-http2-fuzzing
reference_id
reference_type
scores
url https://yahoo-security.tumblr.com/post/122883273670/apache-traffic-server-http2-fuzzing
4
reference_url http://www.securityfocus.com/bid/101631
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101631
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3249
reference_id CVE-2015-3249
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-3249
fixed_packages
0
url pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
purl pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-8aev-nmwa-fkcg
9
vulnerability VCID-931v-ukcc-6qaa
10
vulnerability VCID-aqt5-2ffy-9bgs
11
vulnerability VCID-au6q-ek7r-8bgr
12
vulnerability VCID-b7zx-ywwc-57d9
13
vulnerability VCID-bb5y-kjej-bbfm
14
vulnerability VCID-bdgg-edbf-xfav
15
vulnerability VCID-btm9-vxvc-3qhv
16
vulnerability VCID-c5hc-3jtx-k3a6
17
vulnerability VCID-c675-5njd-63hk
18
vulnerability VCID-cbe5-hhz8-bqbn
19
vulnerability VCID-cscf-sb71-jybq
20
vulnerability VCID-esap-nkps-cfg9
21
vulnerability VCID-fmwc-nmhh-ryaf
22
vulnerability VCID-fq5y-b9yq-nbee
23
vulnerability VCID-hbte-dsw2-y7ad
24
vulnerability VCID-j6r7-ypa1-zybv
25
vulnerability VCID-jabw-thzt-63bb
26
vulnerability VCID-jb1b-9gr2-suez
27
vulnerability VCID-jdjf-3w9k-xbaw
28
vulnerability VCID-k2ks-3t6e-uqgu
29
vulnerability VCID-m8p8-5n65-qyhy
30
vulnerability VCID-msu4-5h99-2yaq
31
vulnerability VCID-n66u-b73u-zucb
32
vulnerability VCID-nbwy-fdv2-uydt
33
vulnerability VCID-p5f7-uu6r-8bez
34
vulnerability VCID-pxaf-6qxa-77h9
35
vulnerability VCID-qwmj-ez4q-7qex
36
vulnerability VCID-r86j-zujn-f7ez
37
vulnerability VCID-rcdg-j23x-xfbn
38
vulnerability VCID-rw58-bnwt-2bam
39
vulnerability VCID-scpg-5hcj-5yd3
40
vulnerability VCID-skrs-cynm-r7du
41
vulnerability VCID-t559-a5u6-4ke1
42
vulnerability VCID-u5qg-vszr-9ye2
43
vulnerability VCID-ue7s-pn8b-vydz
44
vulnerability VCID-uhqf-tsxe-ayc2
45
vulnerability VCID-uhxq-9bzs-u3fd
46
vulnerability VCID-uy1m-av2n-jybt
47
vulnerability VCID-va7d-ktp2-m7et
48
vulnerability VCID-w42s-4aps-y3c5
49
vulnerability VCID-waer-as81-8fed
50
vulnerability VCID-xh97-4sn5-vyfw
51
vulnerability VCID-xwdc-hndy-yubc
52
vulnerability VCID-xwru-y5m9-gucd
53
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@6.2.0-1~bpo8%252B1
aliases CVE-2015-3249
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pd6-v7d1-9qem
12
url VCID-9rs4-uvph-3yh7
vulnerability_id VCID-9rs4-uvph-3yh7
summary Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT.
references
0
reference_url http://mail-archives.apache.org/mod_mbox/www-announce/201411.mbox/%3C20141101231749.2E3561043F%40minotaur.apache.org%3E
reference_id
reference_type
scores
url http://mail-archives.apache.org/mod_mbox/www-announce/201411.mbox/%3C20141101231749.2E3561043F%40minotaur.apache.org%3E
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3624
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.59893
published_at 2026-04-21T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59907
published_at 2026-04-18T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59744
published_at 2026-04-01T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59818
published_at 2026-04-02T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.59841
published_at 2026-04-04T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59811
published_at 2026-04-07T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59862
published_at 2026-04-08T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59876
published_at 2026-04-09T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59897
published_at 2026-04-11T12:55:00Z
9
value 0.00387
scoring_system epss
scoring_elements 0.59881
published_at 2026-04-12T12:55:00Z
10
value 0.00387
scoring_system epss
scoring_elements 0.59863
published_at 2026-04-13T12:55:00Z
11
value 0.00387
scoring_system epss
scoring_elements 0.59901
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3624
3
reference_url https://issues.apache.org/jira/browse/TS-2677
reference_id
reference_type
scores
url https://issues.apache.org/jira/browse/TS-2677
4
reference_url http://www.securityfocus.com/bid/101630
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101630
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.1.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3624
reference_id CVE-2014-3624
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-3624
fixed_packages
0
url pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
purl pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-8aev-nmwa-fkcg
9
vulnerability VCID-931v-ukcc-6qaa
10
vulnerability VCID-aqt5-2ffy-9bgs
11
vulnerability VCID-au6q-ek7r-8bgr
12
vulnerability VCID-b7zx-ywwc-57d9
13
vulnerability VCID-bb5y-kjej-bbfm
14
vulnerability VCID-bdgg-edbf-xfav
15
vulnerability VCID-btm9-vxvc-3qhv
16
vulnerability VCID-c5hc-3jtx-k3a6
17
vulnerability VCID-c675-5njd-63hk
18
vulnerability VCID-cbe5-hhz8-bqbn
19
vulnerability VCID-cscf-sb71-jybq
20
vulnerability VCID-esap-nkps-cfg9
21
vulnerability VCID-fmwc-nmhh-ryaf
22
vulnerability VCID-fq5y-b9yq-nbee
23
vulnerability VCID-hbte-dsw2-y7ad
24
vulnerability VCID-j6r7-ypa1-zybv
25
vulnerability VCID-jabw-thzt-63bb
26
vulnerability VCID-jb1b-9gr2-suez
27
vulnerability VCID-jdjf-3w9k-xbaw
28
vulnerability VCID-k2ks-3t6e-uqgu
29
vulnerability VCID-m8p8-5n65-qyhy
30
vulnerability VCID-msu4-5h99-2yaq
31
vulnerability VCID-n66u-b73u-zucb
32
vulnerability VCID-nbwy-fdv2-uydt
33
vulnerability VCID-p5f7-uu6r-8bez
34
vulnerability VCID-pxaf-6qxa-77h9
35
vulnerability VCID-qwmj-ez4q-7qex
36
vulnerability VCID-r86j-zujn-f7ez
37
vulnerability VCID-rcdg-j23x-xfbn
38
vulnerability VCID-rw58-bnwt-2bam
39
vulnerability VCID-scpg-5hcj-5yd3
40
vulnerability VCID-skrs-cynm-r7du
41
vulnerability VCID-t559-a5u6-4ke1
42
vulnerability VCID-u5qg-vszr-9ye2
43
vulnerability VCID-ue7s-pn8b-vydz
44
vulnerability VCID-uhqf-tsxe-ayc2
45
vulnerability VCID-uhxq-9bzs-u3fd
46
vulnerability VCID-uy1m-av2n-jybt
47
vulnerability VCID-va7d-ktp2-m7et
48
vulnerability VCID-w42s-4aps-y3c5
49
vulnerability VCID-waer-as81-8fed
50
vulnerability VCID-xh97-4sn5-vyfw
51
vulnerability VCID-xwdc-hndy-yubc
52
vulnerability VCID-xwru-y5m9-gucd
53
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@6.2.0-1~bpo8%252B1
aliases CVE-2014-3624
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9rs4-uvph-3yh7
13
url VCID-aqt5-2ffy-9bgs
vulnerability_id VCID-aqt5-2ffy-9bgs
summary HTTP/2: flood using SETTINGS frames results in unbounded memory growth
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9515
reference_id
reference_type
scores
0
value 0.09046
scoring_system epss
scoring_elements 0.92655
published_at 2026-04-21T12:55:00Z
1
value 0.09046
scoring_system epss
scoring_elements 0.92639
published_at 2026-04-13T12:55:00Z
2
value 0.09046
scoring_system epss
scoring_elements 0.9264
published_at 2026-04-12T12:55:00Z
3
value 0.09046
scoring_system epss
scoring_elements 0.92652
published_at 2026-04-18T12:55:00Z
4
value 0.09046
scoring_system epss
scoring_elements 0.92618
published_at 2026-04-07T12:55:00Z
5
value 0.09046
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-08T12:55:00Z
6
value 0.09046
scoring_system epss
scoring_elements 0.92635
published_at 2026-04-09T12:55:00Z
7
value 0.10394
scoring_system epss
scoring_elements 0.93194
published_at 2026-04-02T12:55:00Z
8
value 0.10394
scoring_system epss
scoring_elements 0.93185
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9515
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735745
reference_id 1735745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735745
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
11
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
12
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
13
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
14
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
15
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
16
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
17
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
18
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
19
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9515
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aqt5-2ffy-9bgs
14
url VCID-au6q-ek7r-8bgr
vulnerability_id VCID-au6q-ek7r-8bgr
summary sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11783
reference_id
reference_type
scores
0
value 0.01124
scoring_system epss
scoring_elements 0.78297
published_at 2026-04-21T12:55:00Z
1
value 0.01124
scoring_system epss
scoring_elements 0.78301
published_at 2026-04-18T12:55:00Z
2
value 0.01124
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-01T12:55:00Z
3
value 0.01124
scoring_system epss
scoring_elements 0.78224
published_at 2026-04-02T12:55:00Z
4
value 0.01124
scoring_system epss
scoring_elements 0.78256
published_at 2026-04-04T12:55:00Z
5
value 0.01124
scoring_system epss
scoring_elements 0.78237
published_at 2026-04-07T12:55:00Z
6
value 0.01124
scoring_system epss
scoring_elements 0.78264
published_at 2026-04-08T12:55:00Z
7
value 0.01124
scoring_system epss
scoring_elements 0.7827
published_at 2026-04-09T12:55:00Z
8
value 0.01124
scoring_system epss
scoring_elements 0.78295
published_at 2026-04-11T12:55:00Z
9
value 0.01124
scoring_system epss
scoring_elements 0.78278
published_at 2026-04-12T12:55:00Z
10
value 0.01124
scoring_system epss
scoring_elements 0.78273
published_at 2026-04-13T12:55:00Z
11
value 0.01124
scoring_system epss
scoring_elements 0.78304
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11783
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11783
2
reference_url https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e%40%3Cannounce.trafficserver.apache.org%3E
3
reference_url http://www.securityfocus.com/bid/107032
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107032
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11783
reference_id CVE-2018-11783
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-11783
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-11783
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-au6q-ek7r-8bgr
15
url VCID-b7zx-ywwc-57d9
vulnerability_id VCID-b7zx-ywwc-57d9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31778
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40448
published_at 2026-04-02T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40474
published_at 2026-04-04T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68025
published_at 2026-04-07T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68076
published_at 2026-04-08T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.6809
published_at 2026-04-09T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68115
published_at 2026-04-11T12:55:00Z
6
value 0.02716
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-12T12:55:00Z
7
value 0.02716
scoring_system epss
scoring_elements 0.85925
published_at 2026-04-13T12:55:00Z
8
value 0.02716
scoring_system epss
scoring_elements 0.85944
published_at 2026-04-16T12:55:00Z
9
value 0.02716
scoring_system epss
scoring_elements 0.85947
published_at 2026-04-18T12:55:00Z
10
value 0.02716
scoring_system epss
scoring_elements 0.85938
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31778
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-31778
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7zx-ywwc-57d9
16
url VCID-bb5y-kjej-bbfm
vulnerability_id VCID-bb5y-kjej-bbfm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28129
reference_id
reference_type
scores
0
value 0.02871
scoring_system epss
scoring_elements 0.86284
published_at 2026-04-21T12:55:00Z
1
value 0.04574
scoring_system epss
scoring_elements 0.89184
published_at 2026-04-04T12:55:00Z
2
value 0.04574
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-07T12:55:00Z
3
value 0.04574
scoring_system epss
scoring_elements 0.89205
published_at 2026-04-08T12:55:00Z
4
value 0.04574
scoring_system epss
scoring_elements 0.89209
published_at 2026-04-09T12:55:00Z
5
value 0.04574
scoring_system epss
scoring_elements 0.8917
published_at 2026-04-02T12:55:00Z
6
value 0.04574
scoring_system epss
scoring_elements 0.89215
published_at 2026-04-12T12:55:00Z
7
value 0.04574
scoring_system epss
scoring_elements 0.89213
published_at 2026-04-13T12:55:00Z
8
value 0.04574
scoring_system epss
scoring_elements 0.89225
published_at 2026-04-18T12:55:00Z
9
value 0.04574
scoring_system epss
scoring_elements 0.89219
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28129
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-28129
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5y-kjej-bbfm
17
url VCID-bdgg-edbf-xfav
vulnerability_id VCID-bdgg-edbf-xfav
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47184
reference_id
reference_type
scores
0
value 0.00235
scoring_system epss
scoring_elements 0.46436
published_at 2026-04-02T12:55:00Z
1
value 0.00235
scoring_system epss
scoring_elements 0.46456
published_at 2026-04-04T12:55:00Z
2
value 0.00235
scoring_system epss
scoring_elements 0.46405
published_at 2026-04-07T12:55:00Z
3
value 0.00235
scoring_system epss
scoring_elements 0.46461
published_at 2026-04-09T12:55:00Z
4
value 0.00235
scoring_system epss
scoring_elements 0.46484
published_at 2026-04-11T12:55:00Z
5
value 0.00235
scoring_system epss
scoring_elements 0.46455
published_at 2026-04-12T12:55:00Z
6
value 0.00235
scoring_system epss
scoring_elements 0.46465
published_at 2026-04-13T12:55:00Z
7
value 0.00235
scoring_system epss
scoring_elements 0.46522
published_at 2026-04-16T12:55:00Z
8
value 0.00235
scoring_system epss
scoring_elements 0.46519
published_at 2026-04-18T12:55:00Z
9
value 0.00235
scoring_system epss
scoring_elements 0.46464
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47184
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
reference_id 1038248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
reference_id 6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
6
reference_url https://www.debian.org/security/2023/dsa-5435
reference_id dsa-5435
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://www.debian.org/security/2023/dsa-5435
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
reference_id FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
8
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html
9
reference_url https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
reference_id tns2b4khyyncgs5v5p9y35pobg9z2bvs
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-47184
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdgg-edbf-xfav
18
url VCID-btm9-vxvc-3qhv
vulnerability_id VCID-btm9-vxvc-3qhv
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10079
reference_id
reference_type
scores
0
value 0.05102
scoring_system epss
scoring_elements 0.8984
published_at 2026-04-21T12:55:00Z
1
value 0.05102
scoring_system epss
scoring_elements 0.89846
published_at 2026-04-18T12:55:00Z
2
value 0.05102
scoring_system epss
scoring_elements 0.8979
published_at 2026-04-01T12:55:00Z
3
value 0.05102
scoring_system epss
scoring_elements 0.89793
published_at 2026-04-02T12:55:00Z
4
value 0.05102
scoring_system epss
scoring_elements 0.89807
published_at 2026-04-04T12:55:00Z
5
value 0.05102
scoring_system epss
scoring_elements 0.89811
published_at 2026-04-07T12:55:00Z
6
value 0.05102
scoring_system epss
scoring_elements 0.89828
published_at 2026-04-08T12:55:00Z
7
value 0.05102
scoring_system epss
scoring_elements 0.89835
published_at 2026-04-09T12:55:00Z
8
value 0.05102
scoring_system epss
scoring_elements 0.89841
published_at 2026-04-11T12:55:00Z
9
value 0.05102
scoring_system epss
scoring_elements 0.89839
published_at 2026-04-12T12:55:00Z
10
value 0.05102
scoring_system epss
scoring_elements 0.89832
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10079
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
6
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10079
reference_id CVE-2019-10079
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10079
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-10079
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btm9-vxvc-3qhv
19
url VCID-c5hc-3jtx-k3a6
vulnerability_id VCID-c5hc-3jtx-k3a6
summary HTTP/2: flood using empty frames results in excessive resource consumption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9518.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9518
reference_id
reference_type
scores
0
value 0.03645
scoring_system epss
scoring_elements 0.8787
published_at 2026-04-21T12:55:00Z
1
value 0.03645
scoring_system epss
scoring_elements 0.8786
published_at 2026-04-13T12:55:00Z
2
value 0.03645
scoring_system epss
scoring_elements 0.87874
published_at 2026-04-16T12:55:00Z
3
value 0.03645
scoring_system epss
scoring_elements 0.87873
published_at 2026-04-18T12:55:00Z
4
value 0.03645
scoring_system epss
scoring_elements 0.87825
published_at 2026-04-04T12:55:00Z
5
value 0.03645
scoring_system epss
scoring_elements 0.87829
published_at 2026-04-07T12:55:00Z
6
value 0.03645
scoring_system epss
scoring_elements 0.8785
published_at 2026-04-08T12:55:00Z
7
value 0.03645
scoring_system epss
scoring_elements 0.87857
published_at 2026-04-09T12:55:00Z
8
value 0.03645
scoring_system epss
scoring_elements 0.87868
published_at 2026-04-11T12:55:00Z
9
value 0.03645
scoring_system epss
scoring_elements 0.87862
published_at 2026-04-12T12:55:00Z
10
value 0.04696
scoring_system epss
scoring_elements 0.89316
published_at 2026-04-02T12:55:00Z
11
value 0.04696
scoring_system epss
scoring_elements 0.89311
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735749
reference_id 1735749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735749
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935314
reference_id 935314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935314
10
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
11
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
12
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
13
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
14
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
15
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9518
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c5hc-3jtx-k3a6
20
url VCID-c675-5njd-63hk
vulnerability_id VCID-c675-5njd-63hk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27577
reference_id
reference_type
scores
0
value 0.01205
scoring_system epss
scoring_elements 0.78899
published_at 2026-04-01T12:55:00Z
1
value 0.01205
scoring_system epss
scoring_elements 0.78905
published_at 2026-04-02T12:55:00Z
2
value 0.01205
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-04T12:55:00Z
3
value 0.01205
scoring_system epss
scoring_elements 0.78917
published_at 2026-04-07T12:55:00Z
4
value 0.01205
scoring_system epss
scoring_elements 0.78942
published_at 2026-04-08T12:55:00Z
5
value 0.01205
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-09T12:55:00Z
6
value 0.01205
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-18T12:55:00Z
7
value 0.01205
scoring_system epss
scoring_elements 0.78957
published_at 2026-04-12T12:55:00Z
8
value 0.01205
scoring_system epss
scoring_elements 0.78947
published_at 2026-04-13T12:55:00Z
9
value 0.01205
scoring_system epss
scoring_elements 0.78975
published_at 2026-04-16T12:55:00Z
10
value 0.01205
scoring_system epss
scoring_elements 0.78971
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27577
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-27577
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c675-5njd-63hk
21
url VCID-cbe5-hhz8-bqbn
vulnerability_id VCID-cbe5-hhz8-bqbn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44759
reference_id
reference_type
scores
0
value 0.02005
scoring_system epss
scoring_elements 0.83612
published_at 2026-04-01T12:55:00Z
1
value 0.02005
scoring_system epss
scoring_elements 0.83625
published_at 2026-04-02T12:55:00Z
2
value 0.02005
scoring_system epss
scoring_elements 0.83639
published_at 2026-04-04T12:55:00Z
3
value 0.02005
scoring_system epss
scoring_elements 0.83641
published_at 2026-04-07T12:55:00Z
4
value 0.02005
scoring_system epss
scoring_elements 0.83665
published_at 2026-04-08T12:55:00Z
5
value 0.02005
scoring_system epss
scoring_elements 0.83672
published_at 2026-04-09T12:55:00Z
6
value 0.02005
scoring_system epss
scoring_elements 0.83689
published_at 2026-04-11T12:55:00Z
7
value 0.02005
scoring_system epss
scoring_elements 0.83682
published_at 2026-04-12T12:55:00Z
8
value 0.02005
scoring_system epss
scoring_elements 0.83678
published_at 2026-04-13T12:55:00Z
9
value 0.02005
scoring_system epss
scoring_elements 0.83713
published_at 2026-04-16T12:55:00Z
10
value 0.02005
scoring_system epss
scoring_elements 0.83714
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44759
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-44759
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbe5-hhz8-bqbn
22
url VCID-cscf-sb71-jybq
vulnerability_id VCID-cscf-sb71-jybq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32566
reference_id
reference_type
scores
0
value 0.07927
scoring_system epss
scoring_elements 0.92013
published_at 2026-04-01T12:55:00Z
1
value 0.07927
scoring_system epss
scoring_elements 0.92019
published_at 2026-04-02T12:55:00Z
2
value 0.07927
scoring_system epss
scoring_elements 0.92027
published_at 2026-04-04T12:55:00Z
3
value 0.07927
scoring_system epss
scoring_elements 0.92032
published_at 2026-04-07T12:55:00Z
4
value 0.07927
scoring_system epss
scoring_elements 0.92044
published_at 2026-04-08T12:55:00Z
5
value 0.07927
scoring_system epss
scoring_elements 0.92047
published_at 2026-04-09T12:55:00Z
6
value 0.07927
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-12T12:55:00Z
7
value 0.07927
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-13T12:55:00Z
8
value 0.07927
scoring_system epss
scoring_elements 0.92066
published_at 2026-04-16T12:55:00Z
9
value 0.07927
scoring_system epss
scoring_elements 0.92063
published_at 2026-04-18T12:55:00Z
10
value 0.07927
scoring_system epss
scoring_elements 0.92061
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32566
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32566
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cscf-sb71-jybq
23
url VCID-esap-nkps-cfg9
vulnerability_id VCID-esap-nkps-cfg9
summary Invalid Accept-Encoding header can cause Apache Traffic Server to fail cache lookup and force forwarding requests. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35296
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31401
published_at 2026-04-21T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31453
published_at 2026-04-16T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31432
published_at 2026-04-18T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31553
published_at 2026-04-02T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31595
published_at 2026-04-04T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31411
published_at 2026-04-07T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31464
published_at 2026-04-08T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31494
published_at 2026-04-09T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31499
published_at 2026-04-11T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-12T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31419
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35296
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35296
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
reference_id 1077141
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
3
reference_url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_id c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T14:01:18Z/
url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2024-35296
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esap-nkps-cfg9
24
url VCID-fmwc-nmhh-ryaf
vulnerability_id VCID-fmwc-nmhh-ryaf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9481
reference_id
reference_type
scores
0
value 0.05231
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-01T12:55:00Z
1
value 0.05231
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-02T12:55:00Z
2
value 0.05231
scoring_system epss
scoring_elements 0.89932
published_at 2026-04-04T12:55:00Z
3
value 0.05231
scoring_system epss
scoring_elements 0.89938
published_at 2026-04-07T12:55:00Z
4
value 0.05231
scoring_system epss
scoring_elements 0.89955
published_at 2026-04-08T12:55:00Z
5
value 0.05231
scoring_system epss
scoring_elements 0.8996
published_at 2026-04-13T12:55:00Z
6
value 0.05231
scoring_system epss
scoring_elements 0.89968
published_at 2026-04-11T12:55:00Z
7
value 0.05231
scoring_system epss
scoring_elements 0.89966
published_at 2026-04-12T12:55:00Z
8
value 0.05231
scoring_system epss
scoring_elements 0.89974
published_at 2026-04-16T12:55:00Z
9
value 0.05231
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-18T12:55:00Z
10
value 0.05231
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9481
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-9481
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fmwc-nmhh-ryaf
25
url VCID-fq5y-b9yq-nbee
vulnerability_id VCID-fq5y-b9yq-nbee
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37148
reference_id
reference_type
scores
0
value 0.01007
scoring_system epss
scoring_elements 0.76995
published_at 2026-04-01T12:55:00Z
1
value 0.01007
scoring_system epss
scoring_elements 0.77001
published_at 2026-04-02T12:55:00Z
2
value 0.01007
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-04T12:55:00Z
3
value 0.01007
scoring_system epss
scoring_elements 0.77011
published_at 2026-04-07T12:55:00Z
4
value 0.01007
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-08T12:55:00Z
5
value 0.01007
scoring_system epss
scoring_elements 0.77053
published_at 2026-04-09T12:55:00Z
6
value 0.01007
scoring_system epss
scoring_elements 0.77082
published_at 2026-04-11T12:55:00Z
7
value 0.01007
scoring_system epss
scoring_elements 0.77061
published_at 2026-04-12T12:55:00Z
8
value 0.01007
scoring_system epss
scoring_elements 0.77056
published_at 2026-04-13T12:55:00Z
9
value 0.01007
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-16T12:55:00Z
10
value 0.01007
scoring_system epss
scoring_elements 0.77099
published_at 2026-04-18T12:55:00Z
11
value 0.01007
scoring_system epss
scoring_elements 0.7709
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37148
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37148
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fq5y-b9yq-nbee
26
url VCID-hbte-dsw2-y7ad
vulnerability_id VCID-hbte-dsw2-y7ad
summary
golang.org/x/net/http vulnerable to ping floods
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

### Specific Go Packages Affected
golang.org/x/net/http2
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
7
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2594
8
reference_url https://access.redhat.com/errata/RHSA-2019:2661
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2661
9
reference_url https://access.redhat.com/errata/RHSA-2019:2682
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2682
10
reference_url https://access.redhat.com/errata/RHSA-2019:2690
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2690
11
reference_url https://access.redhat.com/errata/RHSA-2019:2726
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2726
12
reference_url https://access.redhat.com/errata/RHSA-2019:2766
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2766
13
reference_url https://access.redhat.com/errata/RHSA-2019:2769
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2769
14
reference_url https://access.redhat.com/errata/RHSA-2019:2796
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2796
15
reference_url https://access.redhat.com/errata/RHSA-2019:2861
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2861
16
reference_url https://access.redhat.com/errata/RHSA-2019:2925
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2925
17
reference_url https://access.redhat.com/errata/RHSA-2019:2939
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2939
18
reference_url https://access.redhat.com/errata/RHSA-2019:2955
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2955
19
reference_url https://access.redhat.com/errata/RHSA-2019:2966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2966
20
reference_url https://access.redhat.com/errata/RHSA-2019:3131
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3131
21
reference_url https://access.redhat.com/errata/RHSA-2019:3245
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3245
22
reference_url https://access.redhat.com/errata/RHSA-2019:3265
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3265
23
reference_url https://access.redhat.com/errata/RHSA-2019:3892
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3892
24
reference_url https://access.redhat.com/errata/RHSA-2019:3906
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3906
25
reference_url https://access.redhat.com/errata/RHSA-2019:4018
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4018
26
reference_url https://access.redhat.com/errata/RHSA-2019:4019
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4019
27
reference_url https://access.redhat.com/errata/RHSA-2019:4020
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4020
28
reference_url https://access.redhat.com/errata/RHSA-2019:4021
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4021
29
reference_url https://access.redhat.com/errata/RHSA-2019:4040
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4040
30
reference_url https://access.redhat.com/errata/RHSA-2019:4041
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4041
31
reference_url https://access.redhat.com/errata/RHSA-2019:4042
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4042
32
reference_url https://access.redhat.com/errata/RHSA-2019:4045
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4045
33
reference_url https://access.redhat.com/errata/RHSA-2019:4269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4269
34
reference_url https://access.redhat.com/errata/RHSA-2019:4273
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4273
35
reference_url https://access.redhat.com/errata/RHSA-2019:4352
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4352
36
reference_url https://access.redhat.com/errata/RHSA-2020:0406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0406
37
reference_url https://access.redhat.com/errata/RHSA-2020:0727
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0727
38
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9512.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9512.json
39
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9512
reference_id
reference_type
scores
0
value 0.51232
scoring_system epss
scoring_elements 0.97869
published_at 2026-04-07T12:55:00Z
1
value 0.51232
scoring_system epss
scoring_elements 0.97866
published_at 2026-04-04T12:55:00Z
2
value 0.51232
scoring_system epss
scoring_elements 0.97864
published_at 2026-04-02T12:55:00Z
3
value 0.51232
scoring_system epss
scoring_elements 0.97858
published_at 2026-04-01T12:55:00Z
4
value 0.51232
scoring_system epss
scoring_elements 0.97876
published_at 2026-04-09T12:55:00Z
5
value 0.51232
scoring_system epss
scoring_elements 0.97873
published_at 2026-04-08T12:55:00Z
6
value 0.51232
scoring_system epss
scoring_elements 0.97881
published_at 2026-04-13T12:55:00Z
7
value 0.51232
scoring_system epss
scoring_elements 0.97888
published_at 2026-04-21T12:55:00Z
8
value 0.51232
scoring_system epss
scoring_elements 0.9789
published_at 2026-04-18T12:55:00Z
9
value 0.51232
scoring_system epss
scoring_elements 0.97879
published_at 2026-04-11T12:55:00Z
10
value 0.51232
scoring_system epss
scoring_elements 0.9788
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9512
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
46
reference_url http://seclists.org/fulldisclosure/2019/Aug/16
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2019/Aug/16
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
49
reference_url https://go.dev/cl/190137
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/190137
50
reference_url https://go.dev/issue/33606
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/33606
51
reference_url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
52
reference_url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
53
reference_url https://kb.cert.org/vuls/id/605641
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kb.cert.org/vuls/id/605641
54
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
55
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
56
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
57
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
58
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
59
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9512
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-9512
64
reference_url https://pkg.go.dev/vuln/GO-2022-0536
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0536
65
reference_url https://seclists.org/bugtraq/2019/Aug/24
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/24
66
reference_url https://seclists.org/bugtraq/2019/Aug/31
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/31
67
reference_url https://seclists.org/bugtraq/2019/Aug/43
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/43
68
reference_url https://seclists.org/bugtraq/2019/Sep/18
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Sep/18
69
reference_url https://security.netapp.com/advisory/ntap-20190823-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0001
70
reference_url https://security.netapp.com/advisory/ntap-20190823-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0004
71
reference_url https://security.netapp.com/advisory/ntap-20190823-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0005
72
reference_url https://support.f5.com/csp/article/K98053339
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K98053339
73
reference_url https://support.f5.com/csp/article/K98053339?utm_source=f5support&utm_medium=RSS
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K98053339?utm_source=f5support&utm_medium=RSS
74
reference_url https://usn.ubuntu.com/4308-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4308-1
75
reference_url https://www.debian.org/security/2019/dsa-4503
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4503
76
reference_url https://www.debian.org/security/2019/dsa-4508
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4508
77
reference_url https://www.debian.org/security/2019/dsa-4520
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4520
78
reference_url https://www.synology.com/security/advisory/Synology_SA_19_33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.synology.com/security/advisory/Synology_SA_19_33
79
reference_url http://www.openwall.com/lists/oss-security/2019/08/20/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/08/20/1
80
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735645
reference_id 1735645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735645
81
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
82
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
83
reference_url https://security.archlinux.org/ASA-201908-15
reference_id ASA-201908-15
reference_type
scores
url https://security.archlinux.org/ASA-201908-15
84
reference_url https://security.archlinux.org/AVG-1021
reference_id AVG-1021
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1021
85
reference_url https://access.redhat.com/errata/RHSA-2019:2817
reference_id RHSA-2019:2817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2817
86
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
87
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
88
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
89
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
90
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
91
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
92
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
93
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
94
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9512, GHSA-hgr8-6h9x-f7q9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hbte-dsw2-y7ad
27
url VCID-j6r7-ypa1-zybv
vulnerability_id VCID-j6r7-ypa1-zybv
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17509
reference_id
reference_type
scores
0
value 0.03046
scoring_system epss
scoring_elements 0.86623
published_at 2026-04-01T12:55:00Z
1
value 0.03046
scoring_system epss
scoring_elements 0.86635
published_at 2026-04-02T12:55:00Z
2
value 0.03046
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-04T12:55:00Z
3
value 0.03046
scoring_system epss
scoring_elements 0.86653
published_at 2026-04-07T12:55:00Z
4
value 0.03046
scoring_system epss
scoring_elements 0.86673
published_at 2026-04-08T12:55:00Z
5
value 0.03046
scoring_system epss
scoring_elements 0.86682
published_at 2026-04-09T12:55:00Z
6
value 0.03046
scoring_system epss
scoring_elements 0.86696
published_at 2026-04-11T12:55:00Z
7
value 0.03046
scoring_system epss
scoring_elements 0.86693
published_at 2026-04-12T12:55:00Z
8
value 0.03046
scoring_system epss
scoring_elements 0.86686
published_at 2026-04-13T12:55:00Z
9
value 0.03046
scoring_system epss
scoring_elements 0.867
published_at 2026-04-16T12:55:00Z
10
value 0.03046
scoring_system epss
scoring_elements 0.86706
published_at 2026-04-18T12:55:00Z
11
value 0.03046
scoring_system epss
scoring_elements 0.86699
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17509
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-17509
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6r7-ypa1-zybv
28
url VCID-jabw-thzt-63bb
vulnerability_id VCID-jabw-thzt-63bb
summary Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-50306
reference_id
reference_type
scores
0
value 0.0082
scoring_system epss
scoring_elements 0.74422
published_at 2026-04-21T12:55:00Z
1
value 0.0082
scoring_system epss
scoring_elements 0.74424
published_at 2026-04-16T12:55:00Z
2
value 0.0082
scoring_system epss
scoring_elements 0.74433
published_at 2026-04-18T12:55:00Z
3
value 0.0082
scoring_system epss
scoring_elements 0.74345
published_at 2026-04-02T12:55:00Z
4
value 0.0082
scoring_system epss
scoring_elements 0.74372
published_at 2026-04-04T12:55:00Z
5
value 0.0082
scoring_system epss
scoring_elements 0.74346
published_at 2026-04-07T12:55:00Z
6
value 0.0082
scoring_system epss
scoring_elements 0.74379
published_at 2026-04-08T12:55:00Z
7
value 0.0082
scoring_system epss
scoring_elements 0.74394
published_at 2026-04-09T12:55:00Z
8
value 0.0082
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-11T12:55:00Z
9
value 0.0082
scoring_system epss
scoring_elements 0.74395
published_at 2026-04-12T12:55:00Z
10
value 0.0082
scoring_system epss
scoring_elements 0.74387
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-50306
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50306
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531
reference_id 1087531
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531
3
reference_url https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
reference_id y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:07:42Z/
url https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2024-50306
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jabw-thzt-63bb
29
url VCID-jb1b-9gr2-suez
vulnerability_id VCID-jb1b-9gr2-suez
summary Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users can set a new setting (proxy.config.http.drop_chunked_trailers) not to forward chunked trailer section. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35161
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44089
published_at 2026-04-02T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56653
published_at 2026-04-21T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56682
published_at 2026-04-16T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56681
published_at 2026-04-18T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56654
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-07T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56684
published_at 2026-04-08T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56689
published_at 2026-04-09T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56697
published_at 2026-04-11T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56672
published_at 2026-04-12T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56651
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35161
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35161
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
reference_id 1077141
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
3
reference_url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_id c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-31T17:38:35Z/
url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2024-35161
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jb1b-9gr2-suez
30
url VCID-jdjf-3w9k-xbaw
vulnerability_id VCID-jdjf-3w9k-xbaw
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41752
reference_id
reference_type
scores
0
value 0.00347
scoring_system epss
scoring_elements 0.57273
published_at 2026-04-02T12:55:00Z
1
value 0.00347
scoring_system epss
scoring_elements 0.57296
published_at 2026-04-04T12:55:00Z
2
value 0.00347
scoring_system epss
scoring_elements 0.57272
published_at 2026-04-07T12:55:00Z
3
value 0.00347
scoring_system epss
scoring_elements 0.57324
published_at 2026-04-08T12:55:00Z
4
value 0.00347
scoring_system epss
scoring_elements 0.57326
published_at 2026-04-16T12:55:00Z
5
value 0.00347
scoring_system epss
scoring_elements 0.57339
published_at 2026-04-11T12:55:00Z
6
value 0.00347
scoring_system epss
scoring_elements 0.57319
published_at 2026-04-12T12:55:00Z
7
value 0.00347
scoring_system epss
scoring_elements 0.57298
published_at 2026-04-13T12:55:00Z
8
value 0.00347
scoring_system epss
scoring_elements 0.57321
published_at 2026-04-18T12:55:00Z
9
value 0.00347
scoring_system epss
scoring_elements 0.573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41752
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054427
reference_id 1054427
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054427
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
reference_id VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-13T19:48:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-41752
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdjf-3w9k-xbaw
31
url VCID-k2ks-3t6e-uqgu
vulnerability_id VCID-k2ks-3t6e-uqgu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1944
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.79002
published_at 2026-04-16T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-13T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78928
published_at 2026-04-01T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-02T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78961
published_at 2026-04-04T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-07T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.7897
published_at 2026-04-08T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-09T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-21T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78984
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1944
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1944
reference_id CVE-2020-1944
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-1944
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-1944
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ks-3t6e-uqgu
32
url VCID-khz4-1uav-cqgg
vulnerability_id VCID-khz4-1uav-cqgg
summary Unspecified vulnerability in the HTTP/2 experimental feature in Apache Traffic Server 5.3.x before 5.3.2 has unknown impact and attack vectors, a different vulnerability than CVE-2015-5206.
references
0
reference_url http://mail-archives.us.apache.org/mod_mbox/www-announce/201509.mbox/%3CCABF6JR2j5vesvnjbm6sDPB_zAGj3kNgzzHEpLUh6dWG6t8mC2w%40mail.gmail.com%3E
reference_id
reference_type
scores
url http://mail-archives.us.apache.org/mod_mbox/www-announce/201509.mbox/%3CCABF6JR2j5vesvnjbm6sDPB_zAGj3kNgzzHEpLUh6dWG6t8mC2w%40mail.gmail.com%3E
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5168
reference_id
reference_type
scores
0
value 0.01885
scoring_system epss
scoring_elements 0.83207
published_at 2026-04-21T12:55:00Z
1
value 0.01885
scoring_system epss
scoring_elements 0.83204
published_at 2026-04-18T12:55:00Z
2
value 0.01885
scoring_system epss
scoring_elements 0.831
published_at 2026-04-01T12:55:00Z
3
value 0.01885
scoring_system epss
scoring_elements 0.83116
published_at 2026-04-02T12:55:00Z
4
value 0.01885
scoring_system epss
scoring_elements 0.8313
published_at 2026-04-04T12:55:00Z
5
value 0.01885
scoring_system epss
scoring_elements 0.83128
published_at 2026-04-07T12:55:00Z
6
value 0.01885
scoring_system epss
scoring_elements 0.83153
published_at 2026-04-08T12:55:00Z
7
value 0.01885
scoring_system epss
scoring_elements 0.8316
published_at 2026-04-09T12:55:00Z
8
value 0.01885
scoring_system epss
scoring_elements 0.83176
published_at 2026-04-11T12:55:00Z
9
value 0.01885
scoring_system epss
scoring_elements 0.8317
published_at 2026-04-12T12:55:00Z
10
value 0.01885
scoring_system epss
scoring_elements 0.83166
published_at 2026-04-13T12:55:00Z
11
value 0.01885
scoring_system epss
scoring_elements 0.83203
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5168
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5168
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.0:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:5.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.3.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5168
reference_id CVE-2015-5168
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-5168
fixed_packages
0
url pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
purl pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-8aev-nmwa-fkcg
9
vulnerability VCID-931v-ukcc-6qaa
10
vulnerability VCID-aqt5-2ffy-9bgs
11
vulnerability VCID-au6q-ek7r-8bgr
12
vulnerability VCID-b7zx-ywwc-57d9
13
vulnerability VCID-bb5y-kjej-bbfm
14
vulnerability VCID-bdgg-edbf-xfav
15
vulnerability VCID-btm9-vxvc-3qhv
16
vulnerability VCID-c5hc-3jtx-k3a6
17
vulnerability VCID-c675-5njd-63hk
18
vulnerability VCID-cbe5-hhz8-bqbn
19
vulnerability VCID-cscf-sb71-jybq
20
vulnerability VCID-esap-nkps-cfg9
21
vulnerability VCID-fmwc-nmhh-ryaf
22
vulnerability VCID-fq5y-b9yq-nbee
23
vulnerability VCID-hbte-dsw2-y7ad
24
vulnerability VCID-j6r7-ypa1-zybv
25
vulnerability VCID-jabw-thzt-63bb
26
vulnerability VCID-jb1b-9gr2-suez
27
vulnerability VCID-jdjf-3w9k-xbaw
28
vulnerability VCID-k2ks-3t6e-uqgu
29
vulnerability VCID-m8p8-5n65-qyhy
30
vulnerability VCID-msu4-5h99-2yaq
31
vulnerability VCID-n66u-b73u-zucb
32
vulnerability VCID-nbwy-fdv2-uydt
33
vulnerability VCID-p5f7-uu6r-8bez
34
vulnerability VCID-pxaf-6qxa-77h9
35
vulnerability VCID-qwmj-ez4q-7qex
36
vulnerability VCID-r86j-zujn-f7ez
37
vulnerability VCID-rcdg-j23x-xfbn
38
vulnerability VCID-rw58-bnwt-2bam
39
vulnerability VCID-scpg-5hcj-5yd3
40
vulnerability VCID-skrs-cynm-r7du
41
vulnerability VCID-t559-a5u6-4ke1
42
vulnerability VCID-u5qg-vszr-9ye2
43
vulnerability VCID-ue7s-pn8b-vydz
44
vulnerability VCID-uhqf-tsxe-ayc2
45
vulnerability VCID-uhxq-9bzs-u3fd
46
vulnerability VCID-uy1m-av2n-jybt
47
vulnerability VCID-va7d-ktp2-m7et
48
vulnerability VCID-w42s-4aps-y3c5
49
vulnerability VCID-waer-as81-8fed
50
vulnerability VCID-xh97-4sn5-vyfw
51
vulnerability VCID-xwdc-hndy-yubc
52
vulnerability VCID-xwru-y5m9-gucd
53
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@6.2.0-1~bpo8%252B1
aliases CVE-2015-5168
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khz4-1uav-cqgg
33
url VCID-m8p8-5n65-qyhy
vulnerability_id VCID-m8p8-5n65-qyhy
summary Apache Traffic Server 6.0.0 to 6.2.0 are affected by an HPACK Bomb Attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5396
reference_id
reference_type
scores
0
value 0.01806
scoring_system epss
scoring_elements 0.82855
published_at 2026-04-21T12:55:00Z
1
value 0.01806
scoring_system epss
scoring_elements 0.82852
published_at 2026-04-18T12:55:00Z
2
value 0.01806
scoring_system epss
scoring_elements 0.82749
published_at 2026-04-01T12:55:00Z
3
value 0.01806
scoring_system epss
scoring_elements 0.82765
published_at 2026-04-02T12:55:00Z
4
value 0.01806
scoring_system epss
scoring_elements 0.82779
published_at 2026-04-04T12:55:00Z
5
value 0.01806
scoring_system epss
scoring_elements 0.82776
published_at 2026-04-07T12:55:00Z
6
value 0.01806
scoring_system epss
scoring_elements 0.82802
published_at 2026-04-08T12:55:00Z
7
value 0.01806
scoring_system epss
scoring_elements 0.82808
published_at 2026-04-09T12:55:00Z
8
value 0.01806
scoring_system epss
scoring_elements 0.82824
published_at 2026-04-11T12:55:00Z
9
value 0.01806
scoring_system epss
scoring_elements 0.82819
published_at 2026-04-12T12:55:00Z
10
value 0.01806
scoring_system epss
scoring_elements 0.82815
published_at 2026-04-13T12:55:00Z
11
value 0.01806
scoring_system epss
scoring_elements 0.82853
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5396
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5396
2
reference_url https://issues.apache.org/jira/browse/TS-5019
reference_id
reference_type
scores
url https://issues.apache.org/jira/browse/TS-5019
3
reference_url http://www.securityfocus.com/bid/97945
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97945
4
reference_url http://www.securitytracker.com/id/1038275
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038275
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:6.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:6.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.1.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:6.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.2.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5396
reference_id CVE-2016-5396
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5396
fixed_packages
0
url pkg:deb/debian/trafficserver@7.0.0-4~bpo8%2B1
purl pkg:deb/debian/trafficserver@7.0.0-4~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-au6q-ek7r-8bgr
11
vulnerability VCID-b7zx-ywwc-57d9
12
vulnerability VCID-bb5y-kjej-bbfm
13
vulnerability VCID-bdgg-edbf-xfav
14
vulnerability VCID-btm9-vxvc-3qhv
15
vulnerability VCID-c5hc-3jtx-k3a6
16
vulnerability VCID-c675-5njd-63hk
17
vulnerability VCID-cbe5-hhz8-bqbn
18
vulnerability VCID-cscf-sb71-jybq
19
vulnerability VCID-esap-nkps-cfg9
20
vulnerability VCID-fmwc-nmhh-ryaf
21
vulnerability VCID-fq5y-b9yq-nbee
22
vulnerability VCID-hbte-dsw2-y7ad
23
vulnerability VCID-j6r7-ypa1-zybv
24
vulnerability VCID-jabw-thzt-63bb
25
vulnerability VCID-jb1b-9gr2-suez
26
vulnerability VCID-jdjf-3w9k-xbaw
27
vulnerability VCID-k2ks-3t6e-uqgu
28
vulnerability VCID-msu4-5h99-2yaq
29
vulnerability VCID-n66u-b73u-zucb
30
vulnerability VCID-nbwy-fdv2-uydt
31
vulnerability VCID-p5f7-uu6r-8bez
32
vulnerability VCID-pxaf-6qxa-77h9
33
vulnerability VCID-qwmj-ez4q-7qex
34
vulnerability VCID-r86j-zujn-f7ez
35
vulnerability VCID-rcdg-j23x-xfbn
36
vulnerability VCID-rw58-bnwt-2bam
37
vulnerability VCID-skrs-cynm-r7du
38
vulnerability VCID-t559-a5u6-4ke1
39
vulnerability VCID-u5qg-vszr-9ye2
40
vulnerability VCID-ue7s-pn8b-vydz
41
vulnerability VCID-uhqf-tsxe-ayc2
42
vulnerability VCID-uhxq-9bzs-u3fd
43
vulnerability VCID-uy1m-av2n-jybt
44
vulnerability VCID-va7d-ktp2-m7et
45
vulnerability VCID-w42s-4aps-y3c5
46
vulnerability VCID-waer-as81-8fed
47
vulnerability VCID-xh97-4sn5-vyfw
48
vulnerability VCID-xwdc-hndy-yubc
49
vulnerability VCID-xwru-y5m9-gucd
50
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@7.0.0-4~bpo8%252B1
aliases CVE-2016-5396
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8p8-5n65-qyhy
34
url VCID-msu4-5h99-2yaq
vulnerability_id VCID-msu4-5h99-2yaq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5660
reference_id
reference_type
scores
0
value 0.02584
scoring_system epss
scoring_elements 0.85502
published_at 2026-04-01T12:55:00Z
1
value 0.02584
scoring_system epss
scoring_elements 0.85514
published_at 2026-04-02T12:55:00Z
2
value 0.02584
scoring_system epss
scoring_elements 0.85531
published_at 2026-04-04T12:55:00Z
3
value 0.02584
scoring_system epss
scoring_elements 0.85536
published_at 2026-04-07T12:55:00Z
4
value 0.02584
scoring_system epss
scoring_elements 0.85556
published_at 2026-04-08T12:55:00Z
5
value 0.02584
scoring_system epss
scoring_elements 0.85566
published_at 2026-04-09T12:55:00Z
6
value 0.02584
scoring_system epss
scoring_elements 0.85581
published_at 2026-04-11T12:55:00Z
7
value 0.02584
scoring_system epss
scoring_elements 0.85578
published_at 2026-04-12T12:55:00Z
8
value 0.02584
scoring_system epss
scoring_elements 0.85574
published_at 2026-04-13T12:55:00Z
9
value 0.02584
scoring_system epss
scoring_elements 0.85596
published_at 2026-04-16T12:55:00Z
10
value 0.02584
scoring_system epss
scoring_elements 0.85602
published_at 2026-04-18T12:55:00Z
11
value 0.02584
scoring_system epss
scoring_elements 0.85598
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5660
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2017-5660
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-msu4-5h99-2yaq
35
url VCID-n66u-b73u-zucb
vulnerability_id VCID-n66u-b73u-zucb
summary
golang.org/x/net/http vulnerable to a reset flood
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

### Specific Go Packages Affected
golang.org/x/net/http2
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
7
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2594
8
reference_url https://access.redhat.com/errata/RHSA-2019:2661
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2661
9
reference_url https://access.redhat.com/errata/RHSA-2019:2682
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2682
10
reference_url https://access.redhat.com/errata/RHSA-2019:2690
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2690
11
reference_url https://access.redhat.com/errata/RHSA-2019:2726
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2726
12
reference_url https://access.redhat.com/errata/RHSA-2019:2766
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2766
13
reference_url https://access.redhat.com/errata/RHSA-2019:2769
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2769
14
reference_url https://access.redhat.com/errata/RHSA-2019:2796
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2796
15
reference_url https://access.redhat.com/errata/RHSA-2019:2861
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2861
16
reference_url https://access.redhat.com/errata/RHSA-2019:2925
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2925
17
reference_url https://access.redhat.com/errata/RHSA-2019:2939
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2939
18
reference_url https://access.redhat.com/errata/RHSA-2019:2955
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2955
19
reference_url https://access.redhat.com/errata/RHSA-2019:2966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2966
20
reference_url https://access.redhat.com/errata/RHSA-2019:3131
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3131
21
reference_url https://access.redhat.com/errata/RHSA-2019:3245
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3245
22
reference_url https://access.redhat.com/errata/RHSA-2019:3265
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3265
23
reference_url https://access.redhat.com/errata/RHSA-2019:3892
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3892
24
reference_url https://access.redhat.com/errata/RHSA-2019:3906
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3906
25
reference_url https://access.redhat.com/errata/RHSA-2019:4018
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4018
26
reference_url https://access.redhat.com/errata/RHSA-2019:4019
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4019
27
reference_url https://access.redhat.com/errata/RHSA-2019:4020
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4020
28
reference_url https://access.redhat.com/errata/RHSA-2019:4021
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4021
29
reference_url https://access.redhat.com/errata/RHSA-2019:4040
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4040
30
reference_url https://access.redhat.com/errata/RHSA-2019:4041
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4041
31
reference_url https://access.redhat.com/errata/RHSA-2019:4042
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4042
32
reference_url https://access.redhat.com/errata/RHSA-2019:4045
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4045
33
reference_url https://access.redhat.com/errata/RHSA-2019:4269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4269
34
reference_url https://access.redhat.com/errata/RHSA-2019:4273
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4273
35
reference_url https://access.redhat.com/errata/RHSA-2019:4352
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4352
36
reference_url https://access.redhat.com/errata/RHSA-2020:0406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0406
37
reference_url https://access.redhat.com/errata/RHSA-2020:0727
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0727
38
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9514.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9514.json
39
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9514
reference_id
reference_type
scores
0
value 0.09483
scoring_system epss
scoring_elements 0.92841
published_at 2026-04-21T12:55:00Z
1
value 0.09483
scoring_system epss
scoring_elements 0.92799
published_at 2026-04-01T12:55:00Z
2
value 0.09483
scoring_system epss
scoring_elements 0.92806
published_at 2026-04-02T12:55:00Z
3
value 0.09483
scoring_system epss
scoring_elements 0.9281
published_at 2026-04-04T12:55:00Z
4
value 0.09483
scoring_system epss
scoring_elements 0.92809
published_at 2026-04-07T12:55:00Z
5
value 0.09483
scoring_system epss
scoring_elements 0.92818
published_at 2026-04-08T12:55:00Z
6
value 0.09483
scoring_system epss
scoring_elements 0.92822
published_at 2026-04-09T12:55:00Z
7
value 0.09483
scoring_system epss
scoring_elements 0.92826
published_at 2026-04-13T12:55:00Z
8
value 0.09483
scoring_system epss
scoring_elements 0.92825
published_at 2026-04-12T12:55:00Z
9
value 0.09483
scoring_system epss
scoring_elements 0.92836
published_at 2026-04-16T12:55:00Z
10
value 0.09483
scoring_system epss
scoring_elements 0.92837
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9514
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
51
reference_url http://seclists.org/fulldisclosure/2019/Aug/16
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2019/Aug/16
52
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
53
reference_url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
54
reference_url https://go.dev/cl/190137
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/190137
55
reference_url https://go.dev/issue/33606
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/33606
56
reference_url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
57
reference_url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
58
reference_url https://kb.cert.org/vuls/id/605641
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kb.cert.org/vuls/id/605641
59
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
60
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
61
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
62
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
63
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
64
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
65
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
66
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
67
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9514
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-9514
69
reference_url https://pkg.go.dev/vuln/GO-2022-0536
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0536
70
reference_url https://seclists.org/bugtraq/2019/Aug/24
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/24
71
reference_url https://seclists.org/bugtraq/2019/Aug/31
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/31
72
reference_url https://seclists.org/bugtraq/2019/Aug/43
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/43
73
reference_url https://seclists.org/bugtraq/2019/Sep/18
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Sep/18
74
reference_url https://security.netapp.com/advisory/ntap-20190823-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0001
75
reference_url https://security.netapp.com/advisory/ntap-20190823-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0004
76
reference_url https://security.netapp.com/advisory/ntap-20190823-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0005
77
reference_url https://support.f5.com/csp/article/K01988340
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K01988340
78
reference_url https://support.f5.com/csp/article/K01988340?utm_source=f5support&utm_medium=RSS
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K01988340?utm_source=f5support&utm_medium=RSS
79
reference_url https://usn.ubuntu.com/4308-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4308-1
80
reference_url https://www.debian.org/security/2019/dsa-4503
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4503
81
reference_url https://www.debian.org/security/2019/dsa-4508
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4508
82
reference_url https://www.debian.org/security/2019/dsa-4520
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4520
83
reference_url https://www.debian.org/security/2020/dsa-4669
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2020/dsa-4669
84
reference_url https://www.synology.com/security/advisory/Synology_SA_19_33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.synology.com/security/advisory/Synology_SA_19_33
85
reference_url http://www.openwall.com/lists/oss-security/2019/08/20/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/08/20/1
86
reference_url http://www.openwall.com/lists/oss-security/2023/10/18/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2023/10/18/8
87
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062667
reference_id 1062667
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062667
88
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735744
reference_id 1735744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735744
89
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885
reference_id 934885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885
90
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
91
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
92
reference_url https://security.archlinux.org/ASA-201908-15
reference_id ASA-201908-15
reference_type
scores
url https://security.archlinux.org/ASA-201908-15
93
reference_url https://security.archlinux.org/AVG-1021
reference_id AVG-1021
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1021
94
reference_url https://access.redhat.com/errata/RHSA-2019:2817
reference_id RHSA-2019:2817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2817
95
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
96
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
97
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
98
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
99
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
100
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
101
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
102
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
103
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9514, GHSA-39qc-96h7-956f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n66u-b73u-zucb
36
url VCID-nbwy-fdv2-uydt
vulnerability_id VCID-nbwy-fdv2-uydt
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7671
reference_id
reference_type
scores
0
value 0.0427
scoring_system epss
scoring_elements 0.88778
published_at 2026-04-01T12:55:00Z
1
value 0.0427
scoring_system epss
scoring_elements 0.88786
published_at 2026-04-02T12:55:00Z
2
value 0.0427
scoring_system epss
scoring_elements 0.88802
published_at 2026-04-04T12:55:00Z
3
value 0.0427
scoring_system epss
scoring_elements 0.88805
published_at 2026-04-07T12:55:00Z
4
value 0.0427
scoring_system epss
scoring_elements 0.88822
published_at 2026-04-08T12:55:00Z
5
value 0.0427
scoring_system epss
scoring_elements 0.88827
published_at 2026-04-09T12:55:00Z
6
value 0.0427
scoring_system epss
scoring_elements 0.88839
published_at 2026-04-11T12:55:00Z
7
value 0.0427
scoring_system epss
scoring_elements 0.88835
published_at 2026-04-12T12:55:00Z
8
value 0.0427
scoring_system epss
scoring_elements 0.88834
published_at 2026-04-13T12:55:00Z
9
value 0.0427
scoring_system epss
scoring_elements 0.88848
published_at 2026-04-16T12:55:00Z
10
value 0.0427
scoring_system epss
scoring_elements 0.88846
published_at 2026-04-18T12:55:00Z
11
value 0.0427
scoring_system epss
scoring_elements 0.88843
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7671
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2017-7671
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbwy-fdv2-uydt
37
url VCID-p5f7-uu6r-8bez
vulnerability_id VCID-p5f7-uu6r-8bez
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31780
reference_id
reference_type
scores
0
value 0.04835
scoring_system epss
scoring_elements 0.8953
published_at 2026-04-21T12:55:00Z
1
value 0.07584
scoring_system epss
scoring_elements 0.91817
published_at 2026-04-04T12:55:00Z
2
value 0.07584
scoring_system epss
scoring_elements 0.91825
published_at 2026-04-07T12:55:00Z
3
value 0.07584
scoring_system epss
scoring_elements 0.91838
published_at 2026-04-08T12:55:00Z
4
value 0.07584
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-09T12:55:00Z
5
value 0.07584
scoring_system epss
scoring_elements 0.91812
published_at 2026-04-02T12:55:00Z
6
value 0.07584
scoring_system epss
scoring_elements 0.91849
published_at 2026-04-12T12:55:00Z
7
value 0.07584
scoring_system epss
scoring_elements 0.91845
published_at 2026-04-13T12:55:00Z
8
value 0.07584
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-16T12:55:00Z
9
value 0.07584
scoring_system epss
scoring_elements 0.91861
published_at 2026-04-18T12:55:00Z
10
value 0.07584
scoring_system epss
scoring_elements 0.91848
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31780
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-31780
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5f7-uu6r-8bez
38
url VCID-pxaf-6qxa-77h9
vulnerability_id VCID-pxaf-6qxa-77h9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17508
reference_id
reference_type
scores
0
value 0.02656
scoring_system epss
scoring_elements 0.85704
published_at 2026-04-01T12:55:00Z
1
value 0.02656
scoring_system epss
scoring_elements 0.85716
published_at 2026-04-02T12:55:00Z
2
value 0.02656
scoring_system epss
scoring_elements 0.85735
published_at 2026-04-04T12:55:00Z
3
value 0.02656
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-07T12:55:00Z
4
value 0.02656
scoring_system epss
scoring_elements 0.8576
published_at 2026-04-08T12:55:00Z
5
value 0.02656
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-09T12:55:00Z
6
value 0.02656
scoring_system epss
scoring_elements 0.85786
published_at 2026-04-11T12:55:00Z
7
value 0.02656
scoring_system epss
scoring_elements 0.85783
published_at 2026-04-12T12:55:00Z
8
value 0.02656
scoring_system epss
scoring_elements 0.8578
published_at 2026-04-13T12:55:00Z
9
value 0.02656
scoring_system epss
scoring_elements 0.85798
published_at 2026-04-16T12:55:00Z
10
value 0.02656
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-18T12:55:00Z
11
value 0.02656
scoring_system epss
scoring_elements 0.85795
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17508
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-17508
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxaf-6qxa-77h9
39
url VCID-qwmj-ez4q-7qex
vulnerability_id VCID-qwmj-ez4q-7qex
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1318
reference_id
reference_type
scores
0
value 0.14594
scoring_system epss
scoring_elements 0.94434
published_at 2026-04-01T12:55:00Z
1
value 0.14594
scoring_system epss
scoring_elements 0.94442
published_at 2026-04-02T12:55:00Z
2
value 0.14594
scoring_system epss
scoring_elements 0.94453
published_at 2026-04-04T12:55:00Z
3
value 0.14594
scoring_system epss
scoring_elements 0.94454
published_at 2026-04-07T12:55:00Z
4
value 0.14594
scoring_system epss
scoring_elements 0.94464
published_at 2026-04-08T12:55:00Z
5
value 0.14594
scoring_system epss
scoring_elements 0.94468
published_at 2026-04-09T12:55:00Z
6
value 0.14594
scoring_system epss
scoring_elements 0.94471
published_at 2026-04-11T12:55:00Z
7
value 0.14594
scoring_system epss
scoring_elements 0.94473
published_at 2026-04-13T12:55:00Z
8
value 0.14594
scoring_system epss
scoring_elements 0.94487
published_at 2026-04-16T12:55:00Z
9
value 0.14594
scoring_system epss
scoring_elements 0.94491
published_at 2026-04-18T12:55:00Z
10
value 0.14594
scoring_system epss
scoring_elements 0.94495
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1318
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-1318
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwmj-ez4q-7qex
40
url VCID-r86j-zujn-f7ez
vulnerability_id VCID-r86j-zujn-f7ez
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8005
reference_id
reference_type
scores
0
value 0.06689
scoring_system epss
scoring_elements 0.9119
published_at 2026-04-01T12:55:00Z
1
value 0.06689
scoring_system epss
scoring_elements 0.91195
published_at 2026-04-02T12:55:00Z
2
value 0.06689
scoring_system epss
scoring_elements 0.91203
published_at 2026-04-04T12:55:00Z
3
value 0.06689
scoring_system epss
scoring_elements 0.9121
published_at 2026-04-07T12:55:00Z
4
value 0.06689
scoring_system epss
scoring_elements 0.91223
published_at 2026-04-08T12:55:00Z
5
value 0.06689
scoring_system epss
scoring_elements 0.9123
published_at 2026-04-09T12:55:00Z
6
value 0.06689
scoring_system epss
scoring_elements 0.91237
published_at 2026-04-11T12:55:00Z
7
value 0.06689
scoring_system epss
scoring_elements 0.9124
published_at 2026-04-12T12:55:00Z
8
value 0.06689
scoring_system epss
scoring_elements 0.91239
published_at 2026-04-13T12:55:00Z
9
value 0.06689
scoring_system epss
scoring_elements 0.91264
published_at 2026-04-16T12:55:00Z
10
value 0.06689
scoring_system epss
scoring_elements 0.91263
published_at 2026-04-18T12:55:00Z
11
value 0.06689
scoring_system epss
scoring_elements 0.91265
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8005
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-8005
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r86j-zujn-f7ez
41
url VCID-rcdg-j23x-xfbn
vulnerability_id VCID-rcdg-j23x-xfbn
summary Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38479
reference_id
reference_type
scores
0
value 0.00574
scoring_system epss
scoring_elements 0.68756
published_at 2026-04-21T12:55:00Z
1
value 0.00574
scoring_system epss
scoring_elements 0.68767
published_at 2026-04-16T12:55:00Z
2
value 0.00574
scoring_system epss
scoring_elements 0.68778
published_at 2026-04-18T12:55:00Z
3
value 0.00574
scoring_system epss
scoring_elements 0.6868
published_at 2026-04-02T12:55:00Z
4
value 0.00574
scoring_system epss
scoring_elements 0.687
published_at 2026-04-04T12:55:00Z
5
value 0.00574
scoring_system epss
scoring_elements 0.68677
published_at 2026-04-07T12:55:00Z
6
value 0.00574
scoring_system epss
scoring_elements 0.68728
published_at 2026-04-08T12:55:00Z
7
value 0.00574
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-09T12:55:00Z
8
value 0.00574
scoring_system epss
scoring_elements 0.68769
published_at 2026-04-11T12:55:00Z
9
value 0.00574
scoring_system epss
scoring_elements 0.68755
published_at 2026-04-12T12:55:00Z
10
value 0.00574
scoring_system epss
scoring_elements 0.68726
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38479
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38479
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531
reference_id 1087531
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531
3
reference_url https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
reference_id y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:51:08Z/
url https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2024-38479
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcdg-j23x-xfbn
42
url VCID-rw58-bnwt-2bam
vulnerability_id VCID-rw58-bnwt-2bam
summary Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38522
reference_id
reference_type
scores
0
value 0.00364
scoring_system epss
scoring_elements 0.585
published_at 2026-04-21T12:55:00Z
1
value 0.00364
scoring_system epss
scoring_elements 0.58521
published_at 2026-04-18T12:55:00Z
2
value 0.00364
scoring_system epss
scoring_elements 0.58458
published_at 2026-04-02T12:55:00Z
3
value 0.00364
scoring_system epss
scoring_elements 0.58477
published_at 2026-04-04T12:55:00Z
4
value 0.00364
scoring_system epss
scoring_elements 0.58448
published_at 2026-04-07T12:55:00Z
5
value 0.00364
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-08T12:55:00Z
6
value 0.00364
scoring_system epss
scoring_elements 0.58507
published_at 2026-04-09T12:55:00Z
7
value 0.00364
scoring_system epss
scoring_elements 0.58524
published_at 2026-04-11T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58504
published_at 2026-04-12T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58485
published_at 2026-04-13T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58517
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38522
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38522
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
reference_id 1077141
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
3
reference_url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_id c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T13:37:29Z/
url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2023-38522
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rw58-bnwt-2bam
43
url VCID-scpg-5hcj-5yd3
vulnerability_id VCID-scpg-5hcj-5yd3
summary Apache Traffic Server before 6.2.1 generates a coredump when there is a mismatch between content length and chunked encoding.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5659
reference_id
reference_type
scores
0
value 0.01972
scoring_system epss
scoring_elements 0.83583
published_at 2026-04-21T12:55:00Z
1
value 0.01972
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-18T12:55:00Z
2
value 0.01972
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-01T12:55:00Z
3
value 0.01972
scoring_system epss
scoring_elements 0.83493
published_at 2026-04-02T12:55:00Z
4
value 0.01972
scoring_system epss
scoring_elements 0.83507
published_at 2026-04-04T12:55:00Z
5
value 0.01972
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-07T12:55:00Z
6
value 0.01972
scoring_system epss
scoring_elements 0.83532
published_at 2026-04-08T12:55:00Z
7
value 0.01972
scoring_system epss
scoring_elements 0.83542
published_at 2026-04-09T12:55:00Z
8
value 0.01972
scoring_system epss
scoring_elements 0.83556
published_at 2026-04-11T12:55:00Z
9
value 0.01972
scoring_system epss
scoring_elements 0.83551
published_at 2026-04-12T12:55:00Z
10
value 0.01972
scoring_system epss
scoring_elements 0.83546
published_at 2026-04-13T12:55:00Z
11
value 0.01972
scoring_system epss
scoring_elements 0.8358
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5659
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5659
2
reference_url https://issues.apache.org/jira/browse/TS-4819
reference_id
reference_type
scores
url https://issues.apache.org/jira/browse/TS-4819
3
reference_url http://www.securityfocus.com/bid/97949
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97949
4
reference_url http://www.securitytracker.com/id/1038275
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038275
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5659
reference_id CVE-2017-5659
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5659
fixed_packages
0
url pkg:deb/debian/trafficserver@7.0.0-4~bpo8%2B1
purl pkg:deb/debian/trafficserver@7.0.0-4~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-au6q-ek7r-8bgr
11
vulnerability VCID-b7zx-ywwc-57d9
12
vulnerability VCID-bb5y-kjej-bbfm
13
vulnerability VCID-bdgg-edbf-xfav
14
vulnerability VCID-btm9-vxvc-3qhv
15
vulnerability VCID-c5hc-3jtx-k3a6
16
vulnerability VCID-c675-5njd-63hk
17
vulnerability VCID-cbe5-hhz8-bqbn
18
vulnerability VCID-cscf-sb71-jybq
19
vulnerability VCID-esap-nkps-cfg9
20
vulnerability VCID-fmwc-nmhh-ryaf
21
vulnerability VCID-fq5y-b9yq-nbee
22
vulnerability VCID-hbte-dsw2-y7ad
23
vulnerability VCID-j6r7-ypa1-zybv
24
vulnerability VCID-jabw-thzt-63bb
25
vulnerability VCID-jb1b-9gr2-suez
26
vulnerability VCID-jdjf-3w9k-xbaw
27
vulnerability VCID-k2ks-3t6e-uqgu
28
vulnerability VCID-msu4-5h99-2yaq
29
vulnerability VCID-n66u-b73u-zucb
30
vulnerability VCID-nbwy-fdv2-uydt
31
vulnerability VCID-p5f7-uu6r-8bez
32
vulnerability VCID-pxaf-6qxa-77h9
33
vulnerability VCID-qwmj-ez4q-7qex
34
vulnerability VCID-r86j-zujn-f7ez
35
vulnerability VCID-rcdg-j23x-xfbn
36
vulnerability VCID-rw58-bnwt-2bam
37
vulnerability VCID-skrs-cynm-r7du
38
vulnerability VCID-t559-a5u6-4ke1
39
vulnerability VCID-u5qg-vszr-9ye2
40
vulnerability VCID-ue7s-pn8b-vydz
41
vulnerability VCID-uhqf-tsxe-ayc2
42
vulnerability VCID-uhxq-9bzs-u3fd
43
vulnerability VCID-uy1m-av2n-jybt
44
vulnerability VCID-va7d-ktp2-m7et
45
vulnerability VCID-w42s-4aps-y3c5
46
vulnerability VCID-waer-as81-8fed
47
vulnerability VCID-xh97-4sn5-vyfw
48
vulnerability VCID-xwdc-hndy-yubc
49
vulnerability VCID-xwru-y5m9-gucd
50
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@7.0.0-4~bpo8%252B1
aliases CVE-2017-5659
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-scpg-5hcj-5yd3
44
url VCID-skrs-cynm-r7du
vulnerability_id VCID-skrs-cynm-r7du
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33933
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33635
published_at 2026-04-04T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33602
published_at 2026-04-02T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33551
published_at 2026-04-09T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33517
published_at 2026-04-08T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33473
published_at 2026-04-07T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.34976
published_at 2026-04-21T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35058
published_at 2026-04-11T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35022
published_at 2026-04-12T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.34999
published_at 2026-04-13T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.35038
published_at 2026-04-16T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.35023
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33933
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
reference_id 1038248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
reference_id 6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
6
reference_url https://www.debian.org/security/2023/dsa-5435
reference_id dsa-5435
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://www.debian.org/security/2023/dsa-5435
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
reference_id FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
8
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html
9
reference_url https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
reference_id tns2b4khyyncgs5v5p9y35pobg9z2bvs
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-33933
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skrs-cynm-r7du
45
url VCID-t559-a5u6-4ke1
vulnerability_id VCID-t559-a5u6-4ke1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37147
reference_id
reference_type
scores
0
value 0.00656
scoring_system epss
scoring_elements 0.70964
published_at 2026-04-01T12:55:00Z
1
value 0.00656
scoring_system epss
scoring_elements 0.70973
published_at 2026-04-02T12:55:00Z
2
value 0.00656
scoring_system epss
scoring_elements 0.70991
published_at 2026-04-04T12:55:00Z
3
value 0.00656
scoring_system epss
scoring_elements 0.70966
published_at 2026-04-07T12:55:00Z
4
value 0.00656
scoring_system epss
scoring_elements 0.71008
published_at 2026-04-08T12:55:00Z
5
value 0.00656
scoring_system epss
scoring_elements 0.71023
published_at 2026-04-09T12:55:00Z
6
value 0.00656
scoring_system epss
scoring_elements 0.71045
published_at 2026-04-11T12:55:00Z
7
value 0.00656
scoring_system epss
scoring_elements 0.7103
published_at 2026-04-12T12:55:00Z
8
value 0.00656
scoring_system epss
scoring_elements 0.71013
published_at 2026-04-13T12:55:00Z
9
value 0.00656
scoring_system epss
scoring_elements 0.71059
published_at 2026-04-16T12:55:00Z
10
value 0.00656
scoring_system epss
scoring_elements 0.71066
published_at 2026-04-18T12:55:00Z
11
value 0.00656
scoring_system epss
scoring_elements 0.71046
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37147
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t559-a5u6-4ke1
46
url VCID-u4tn-85je-n7gt
vulnerability_id VCID-u4tn-85je-n7gt
summary Apache Traffic Server before 5.1.2 allows remote attackers to cause a denial of service via unspecified vectors, related to internal buffer sizing.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-10022
reference_id
reference_type
scores
0
value 0.02709
scoring_system epss
scoring_elements 0.85833
published_at 2026-04-01T12:55:00Z
1
value 0.02709
scoring_system epss
scoring_elements 0.85844
published_at 2026-04-02T12:55:00Z
2
value 0.02709
scoring_system epss
scoring_elements 0.85862
published_at 2026-04-04T12:55:00Z
3
value 0.02709
scoring_system epss
scoring_elements 0.85866
published_at 2026-04-07T12:55:00Z
4
value 0.02709
scoring_system epss
scoring_elements 0.85884
published_at 2026-04-08T12:55:00Z
5
value 0.02709
scoring_system epss
scoring_elements 0.85894
published_at 2026-04-09T12:55:00Z
6
value 0.02709
scoring_system epss
scoring_elements 0.85909
published_at 2026-04-11T12:55:00Z
7
value 0.02709
scoring_system epss
scoring_elements 0.85906
published_at 2026-04-12T12:55:00Z
8
value 0.02709
scoring_system epss
scoring_elements 0.85901
published_at 2026-04-13T12:55:00Z
9
value 0.02709
scoring_system epss
scoring_elements 0.85919
published_at 2026-04-16T12:55:00Z
10
value 0.02709
scoring_system epss
scoring_elements 0.85923
published_at 2026-04-18T12:55:00Z
11
value 0.02709
scoring_system epss
scoring_elements 0.85914
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-10022
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10022
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778895
reference_id 778895
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778895
fixed_packages
0
url pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
purl pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-8aev-nmwa-fkcg
9
vulnerability VCID-931v-ukcc-6qaa
10
vulnerability VCID-aqt5-2ffy-9bgs
11
vulnerability VCID-au6q-ek7r-8bgr
12
vulnerability VCID-b7zx-ywwc-57d9
13
vulnerability VCID-bb5y-kjej-bbfm
14
vulnerability VCID-bdgg-edbf-xfav
15
vulnerability VCID-btm9-vxvc-3qhv
16
vulnerability VCID-c5hc-3jtx-k3a6
17
vulnerability VCID-c675-5njd-63hk
18
vulnerability VCID-cbe5-hhz8-bqbn
19
vulnerability VCID-cscf-sb71-jybq
20
vulnerability VCID-esap-nkps-cfg9
21
vulnerability VCID-fmwc-nmhh-ryaf
22
vulnerability VCID-fq5y-b9yq-nbee
23
vulnerability VCID-hbte-dsw2-y7ad
24
vulnerability VCID-j6r7-ypa1-zybv
25
vulnerability VCID-jabw-thzt-63bb
26
vulnerability VCID-jb1b-9gr2-suez
27
vulnerability VCID-jdjf-3w9k-xbaw
28
vulnerability VCID-k2ks-3t6e-uqgu
29
vulnerability VCID-m8p8-5n65-qyhy
30
vulnerability VCID-msu4-5h99-2yaq
31
vulnerability VCID-n66u-b73u-zucb
32
vulnerability VCID-nbwy-fdv2-uydt
33
vulnerability VCID-p5f7-uu6r-8bez
34
vulnerability VCID-pxaf-6qxa-77h9
35
vulnerability VCID-qwmj-ez4q-7qex
36
vulnerability VCID-r86j-zujn-f7ez
37
vulnerability VCID-rcdg-j23x-xfbn
38
vulnerability VCID-rw58-bnwt-2bam
39
vulnerability VCID-scpg-5hcj-5yd3
40
vulnerability VCID-skrs-cynm-r7du
41
vulnerability VCID-t559-a5u6-4ke1
42
vulnerability VCID-u5qg-vszr-9ye2
43
vulnerability VCID-ue7s-pn8b-vydz
44
vulnerability VCID-uhqf-tsxe-ayc2
45
vulnerability VCID-uhxq-9bzs-u3fd
46
vulnerability VCID-uy1m-av2n-jybt
47
vulnerability VCID-va7d-ktp2-m7et
48
vulnerability VCID-w42s-4aps-y3c5
49
vulnerability VCID-waer-as81-8fed
50
vulnerability VCID-xh97-4sn5-vyfw
51
vulnerability VCID-xwdc-hndy-yubc
52
vulnerability VCID-xwru-y5m9-gucd
53
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@6.2.0-1~bpo8%252B1
aliases CVE-2014-10022
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4tn-85je-n7gt
47
url VCID-u5qg-vszr-9ye2
vulnerability_id VCID-u5qg-vszr-9ye2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47185
reference_id
reference_type
scores
0
value 0.00364
scoring_system epss
scoring_elements 0.58494
published_at 2026-04-21T12:55:00Z
1
value 0.00364
scoring_system epss
scoring_elements 0.58495
published_at 2026-04-08T12:55:00Z
2
value 0.00364
scoring_system epss
scoring_elements 0.58502
published_at 2026-04-09T12:55:00Z
3
value 0.00364
scoring_system epss
scoring_elements 0.58519
published_at 2026-04-11T12:55:00Z
4
value 0.00364
scoring_system epss
scoring_elements 0.58499
published_at 2026-04-12T12:55:00Z
5
value 0.00364
scoring_system epss
scoring_elements 0.58479
published_at 2026-04-13T12:55:00Z
6
value 0.00364
scoring_system epss
scoring_elements 0.58511
published_at 2026-04-16T12:55:00Z
7
value 0.00364
scoring_system epss
scoring_elements 0.58516
published_at 2026-04-18T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.5845
published_at 2026-04-02T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58469
published_at 2026-04-04T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58443
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47185
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430
reference_id 1043430
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/
reference_id BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/
6
reference_url https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
reference_id jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/
url https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
7
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-47185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u5qg-vszr-9ye2
48
url VCID-ue7s-pn8b-vydz
vulnerability_id VCID-ue7s-pn8b-vydz
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8004
reference_id
reference_type
scores
0
value 0.02594
scoring_system epss
scoring_elements 0.85523
published_at 2026-04-01T12:55:00Z
1
value 0.02594
scoring_system epss
scoring_elements 0.85535
published_at 2026-04-02T12:55:00Z
2
value 0.02594
scoring_system epss
scoring_elements 0.85553
published_at 2026-04-04T12:55:00Z
3
value 0.02594
scoring_system epss
scoring_elements 0.85558
published_at 2026-04-07T12:55:00Z
4
value 0.02594
scoring_system epss
scoring_elements 0.85578
published_at 2026-04-08T12:55:00Z
5
value 0.02594
scoring_system epss
scoring_elements 0.85589
published_at 2026-04-09T12:55:00Z
6
value 0.02594
scoring_system epss
scoring_elements 0.85603
published_at 2026-04-11T12:55:00Z
7
value 0.02594
scoring_system epss
scoring_elements 0.856
published_at 2026-04-12T12:55:00Z
8
value 0.02594
scoring_system epss
scoring_elements 0.85596
published_at 2026-04-13T12:55:00Z
9
value 0.02594
scoring_system epss
scoring_elements 0.85618
published_at 2026-04-16T12:55:00Z
10
value 0.02594
scoring_system epss
scoring_elements 0.85624
published_at 2026-04-18T12:55:00Z
11
value 0.02594
scoring_system epss
scoring_elements 0.8562
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8004
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-8004
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ue7s-pn8b-vydz
49
url VCID-uhqf-tsxe-ayc2
vulnerability_id VCID-uhqf-tsxe-ayc2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37149
reference_id
reference_type
scores
0
value 0.01007
scoring_system epss
scoring_elements 0.76995
published_at 2026-04-01T12:55:00Z
1
value 0.01007
scoring_system epss
scoring_elements 0.77001
published_at 2026-04-02T12:55:00Z
2
value 0.01007
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-04T12:55:00Z
3
value 0.01007
scoring_system epss
scoring_elements 0.77011
published_at 2026-04-07T12:55:00Z
4
value 0.01007
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-08T12:55:00Z
5
value 0.01007
scoring_system epss
scoring_elements 0.77053
published_at 2026-04-09T12:55:00Z
6
value 0.01007
scoring_system epss
scoring_elements 0.77082
published_at 2026-04-11T12:55:00Z
7
value 0.01007
scoring_system epss
scoring_elements 0.77061
published_at 2026-04-12T12:55:00Z
8
value 0.01007
scoring_system epss
scoring_elements 0.77056
published_at 2026-04-13T12:55:00Z
9
value 0.01007
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-16T12:55:00Z
10
value 0.01007
scoring_system epss
scoring_elements 0.77099
published_at 2026-04-18T12:55:00Z
11
value 0.01007
scoring_system epss
scoring_elements 0.7709
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37149
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37149
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhqf-tsxe-ayc2
50
url VCID-uhxq-9bzs-u3fd
vulnerability_id VCID-uhxq-9bzs-u3fd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35474
reference_id
reference_type
scores
0
value 0.09211
scoring_system epss
scoring_elements 0.92679
published_at 2026-04-01T12:55:00Z
1
value 0.09211
scoring_system epss
scoring_elements 0.92686
published_at 2026-04-02T12:55:00Z
2
value 0.09211
scoring_system epss
scoring_elements 0.92693
published_at 2026-04-04T12:55:00Z
3
value 0.09211
scoring_system epss
scoring_elements 0.92691
published_at 2026-04-07T12:55:00Z
4
value 0.09211
scoring_system epss
scoring_elements 0.92702
published_at 2026-04-08T12:55:00Z
5
value 0.09211
scoring_system epss
scoring_elements 0.92706
published_at 2026-04-09T12:55:00Z
6
value 0.09211
scoring_system epss
scoring_elements 0.92712
published_at 2026-04-12T12:55:00Z
7
value 0.09211
scoring_system epss
scoring_elements 0.9271
published_at 2026-04-13T12:55:00Z
8
value 0.09211
scoring_system epss
scoring_elements 0.92722
published_at 2026-04-18T12:55:00Z
9
value 0.09211
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-35474
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhxq-9bzs-u3fd
51
url VCID-uvhz-uspt-7ygz
vulnerability_id VCID-uvhz-uspt-7ygz
summary Unspecified vulnerability in Apache Traffic Server 3.x through 3.2.5, 4.x before 4.2.1.1, and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.
references
0
reference_url http://mail-archives.apache.org/mod_mbox/trafficserver-users/201407.mbox/%3CBFCEC9C8-1BE9-4DCA-AF9C-B8FE798EEC07%40yahoo-inc.com%3E
reference_id
reference_type
scores
url http://mail-archives.apache.org/mod_mbox/trafficserver-users/201407.mbox/%3CBFCEC9C8-1BE9-4DCA-AF9C-B8FE798EEC07%40yahoo-inc.com%3E
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3525
reference_id
reference_type
scores
0
value 0.0127
scoring_system epss
scoring_elements 0.79519
published_at 2026-04-21T12:55:00Z
1
value 0.0127
scoring_system epss
scoring_elements 0.79437
published_at 2026-04-01T12:55:00Z
2
value 0.0127
scoring_system epss
scoring_elements 0.79444
published_at 2026-04-02T12:55:00Z
3
value 0.0127
scoring_system epss
scoring_elements 0.79468
published_at 2026-04-04T12:55:00Z
4
value 0.0127
scoring_system epss
scoring_elements 0.79455
published_at 2026-04-07T12:55:00Z
5
value 0.0127
scoring_system epss
scoring_elements 0.79483
published_at 2026-04-08T12:55:00Z
6
value 0.0127
scoring_system epss
scoring_elements 0.79491
published_at 2026-04-09T12:55:00Z
7
value 0.0127
scoring_system epss
scoring_elements 0.79513
published_at 2026-04-11T12:55:00Z
8
value 0.0127
scoring_system epss
scoring_elements 0.79496
published_at 2026-04-12T12:55:00Z
9
value 0.0127
scoring_system epss
scoring_elements 0.79487
published_at 2026-04-13T12:55:00Z
10
value 0.0127
scoring_system epss
scoring_elements 0.79517
published_at 2026-04-16T12:55:00Z
11
value 0.0127
scoring_system epss
scoring_elements 0.79514
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3525
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3525
3
reference_url http://secunia.com/advisories/60375
reference_id
reference_type
scores
url http://secunia.com/advisories/60375
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95495
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95495
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.0.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.0.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.0.0:alpha:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.0.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.4:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.5:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.6:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.7:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.8:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:2.1.9:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.0.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.1.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.2.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:3.3.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:4.0.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:4.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:4.2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:4.2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:5.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:5.0.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3525
reference_id CVE-2014-3525
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-3525
fixed_packages
0
url pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
purl pkg:deb/debian/trafficserver@6.2.0-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-8aev-nmwa-fkcg
9
vulnerability VCID-931v-ukcc-6qaa
10
vulnerability VCID-aqt5-2ffy-9bgs
11
vulnerability VCID-au6q-ek7r-8bgr
12
vulnerability VCID-b7zx-ywwc-57d9
13
vulnerability VCID-bb5y-kjej-bbfm
14
vulnerability VCID-bdgg-edbf-xfav
15
vulnerability VCID-btm9-vxvc-3qhv
16
vulnerability VCID-c5hc-3jtx-k3a6
17
vulnerability VCID-c675-5njd-63hk
18
vulnerability VCID-cbe5-hhz8-bqbn
19
vulnerability VCID-cscf-sb71-jybq
20
vulnerability VCID-esap-nkps-cfg9
21
vulnerability VCID-fmwc-nmhh-ryaf
22
vulnerability VCID-fq5y-b9yq-nbee
23
vulnerability VCID-hbte-dsw2-y7ad
24
vulnerability VCID-j6r7-ypa1-zybv
25
vulnerability VCID-jabw-thzt-63bb
26
vulnerability VCID-jb1b-9gr2-suez
27
vulnerability VCID-jdjf-3w9k-xbaw
28
vulnerability VCID-k2ks-3t6e-uqgu
29
vulnerability VCID-m8p8-5n65-qyhy
30
vulnerability VCID-msu4-5h99-2yaq
31
vulnerability VCID-n66u-b73u-zucb
32
vulnerability VCID-nbwy-fdv2-uydt
33
vulnerability VCID-p5f7-uu6r-8bez
34
vulnerability VCID-pxaf-6qxa-77h9
35
vulnerability VCID-qwmj-ez4q-7qex
36
vulnerability VCID-r86j-zujn-f7ez
37
vulnerability VCID-rcdg-j23x-xfbn
38
vulnerability VCID-rw58-bnwt-2bam
39
vulnerability VCID-scpg-5hcj-5yd3
40
vulnerability VCID-skrs-cynm-r7du
41
vulnerability VCID-t559-a5u6-4ke1
42
vulnerability VCID-u5qg-vszr-9ye2
43
vulnerability VCID-ue7s-pn8b-vydz
44
vulnerability VCID-uhqf-tsxe-ayc2
45
vulnerability VCID-uhxq-9bzs-u3fd
46
vulnerability VCID-uy1m-av2n-jybt
47
vulnerability VCID-va7d-ktp2-m7et
48
vulnerability VCID-w42s-4aps-y3c5
49
vulnerability VCID-waer-as81-8fed
50
vulnerability VCID-xh97-4sn5-vyfw
51
vulnerability VCID-xwdc-hndy-yubc
52
vulnerability VCID-xwru-y5m9-gucd
53
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@6.2.0-1~bpo8%252B1
aliases CVE-2014-3525
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvhz-uspt-7ygz
52
url VCID-uy1m-av2n-jybt
vulnerability_id VCID-uy1m-av2n-jybt
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30631
reference_id
reference_type
scores
0
value 0.0062
scoring_system epss
scoring_elements 0.69986
published_at 2026-04-02T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.7
published_at 2026-04-04T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.69977
published_at 2026-04-07T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.70025
published_at 2026-04-08T12:55:00Z
4
value 0.0062
scoring_system epss
scoring_elements 0.70041
published_at 2026-04-09T12:55:00Z
5
value 0.00662
scoring_system epss
scoring_elements 0.71179
published_at 2026-04-21T12:55:00Z
6
value 0.00662
scoring_system epss
scoring_elements 0.71165
published_at 2026-04-12T12:55:00Z
7
value 0.00662
scoring_system epss
scoring_elements 0.71148
published_at 2026-04-13T12:55:00Z
8
value 0.00662
scoring_system epss
scoring_elements 0.71194
published_at 2026-04-16T12:55:00Z
9
value 0.00662
scoring_system epss
scoring_elements 0.71201
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30631
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
reference_id 1038248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-30631
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uy1m-av2n-jybt
53
url VCID-va7d-ktp2-m7et
vulnerability_id VCID-va7d-ktp2-m7et
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8040
reference_id
reference_type
scores
0
value 0.07825
scoring_system epss
scoring_elements 0.91948
published_at 2026-04-01T12:55:00Z
1
value 0.07825
scoring_system epss
scoring_elements 0.91957
published_at 2026-04-02T12:55:00Z
2
value 0.07825
scoring_system epss
scoring_elements 0.91964
published_at 2026-04-04T12:55:00Z
3
value 0.07825
scoring_system epss
scoring_elements 0.9197
published_at 2026-04-07T12:55:00Z
4
value 0.07825
scoring_system epss
scoring_elements 0.91983
published_at 2026-04-08T12:55:00Z
5
value 0.07825
scoring_system epss
scoring_elements 0.91986
published_at 2026-04-09T12:55:00Z
6
value 0.07825
scoring_system epss
scoring_elements 0.91989
published_at 2026-04-11T12:55:00Z
7
value 0.07825
scoring_system epss
scoring_elements 0.91988
published_at 2026-04-12T12:55:00Z
8
value 0.07825
scoring_system epss
scoring_elements 0.91985
published_at 2026-04-13T12:55:00Z
9
value 0.07825
scoring_system epss
scoring_elements 0.92004
published_at 2026-04-16T12:55:00Z
10
value 0.07825
scoring_system epss
scoring_elements 0.92
published_at 2026-04-18T12:55:00Z
11
value 0.07825
scoring_system epss
scoring_elements 0.91997
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-8040
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va7d-ktp2-m7et
54
url VCID-w42s-4aps-y3c5
vulnerability_id VCID-w42s-4aps-y3c5
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38161
reference_id
reference_type
scores
0
value 0.01167
scoring_system epss
scoring_elements 0.78586
published_at 2026-04-01T12:55:00Z
1
value 0.01167
scoring_system epss
scoring_elements 0.78593
published_at 2026-04-02T12:55:00Z
2
value 0.01167
scoring_system epss
scoring_elements 0.78624
published_at 2026-04-04T12:55:00Z
3
value 0.01167
scoring_system epss
scoring_elements 0.78605
published_at 2026-04-07T12:55:00Z
4
value 0.01167
scoring_system epss
scoring_elements 0.7863
published_at 2026-04-08T12:55:00Z
5
value 0.01167
scoring_system epss
scoring_elements 0.78637
published_at 2026-04-09T12:55:00Z
6
value 0.01167
scoring_system epss
scoring_elements 0.78662
published_at 2026-04-11T12:55:00Z
7
value 0.01167
scoring_system epss
scoring_elements 0.78643
published_at 2026-04-12T12:55:00Z
8
value 0.01167
scoring_system epss
scoring_elements 0.78636
published_at 2026-04-13T12:55:00Z
9
value 0.01167
scoring_system epss
scoring_elements 0.78665
published_at 2026-04-16T12:55:00Z
10
value 0.01167
scoring_system epss
scoring_elements 0.78663
published_at 2026-04-18T12:55:00Z
11
value 0.01167
scoring_system epss
scoring_elements 0.7866
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38161
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-38161
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w42s-4aps-y3c5
55
url VCID-waer-as81-8fed
vulnerability_id VCID-waer-as81-8fed
summary trafficserver: CONTINUATION frames DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31309.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31309
reference_id
reference_type
scores
0
value 0.02839
scoring_system epss
scoring_elements 0.86139
published_at 2026-04-02T12:55:00Z
1
value 0.02839
scoring_system epss
scoring_elements 0.86174
published_at 2026-04-08T12:55:00Z
2
value 0.02839
scoring_system epss
scoring_elements 0.86155
published_at 2026-04-07T12:55:00Z
3
value 0.03661
scoring_system epss
scoring_elements 0.87892
published_at 2026-04-12T12:55:00Z
4
value 0.03661
scoring_system epss
scoring_elements 0.87898
published_at 2026-04-11T12:55:00Z
5
value 0.03661
scoring_system epss
scoring_elements 0.87887
published_at 2026-04-09T12:55:00Z
6
value 0.03661
scoring_system epss
scoring_elements 0.87905
published_at 2026-04-16T12:55:00Z
7
value 0.03661
scoring_system epss
scoring_elements 0.87891
published_at 2026-04-13T12:55:00Z
8
value 0.10847
scoring_system epss
scoring_elements 0.934
published_at 2026-04-21T12:55:00Z
9
value 0.10847
scoring_system epss
scoring_elements 0.93394
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31309
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068417
reference_id 1068417
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068417
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269627
reference_id 2269627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2269627
5
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/7
reference_id 7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/7
6
reference_url https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc
reference_id f9qh3g3jvy153wh82pz4onrfj1wh13kc
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc
7
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/
reference_id PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/
reference_id QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/
reference_id T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2024-31309
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-waer-as81-8fed
56
url VCID-xh97-4sn5-vyfw
vulnerability_id VCID-xh97-4sn5-vyfw
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32567
reference_id
reference_type
scores
0
value 0.07927
scoring_system epss
scoring_elements 0.92013
published_at 2026-04-01T12:55:00Z
1
value 0.07927
scoring_system epss
scoring_elements 0.92019
published_at 2026-04-02T12:55:00Z
2
value 0.07927
scoring_system epss
scoring_elements 0.92027
published_at 2026-04-04T12:55:00Z
3
value 0.07927
scoring_system epss
scoring_elements 0.92032
published_at 2026-04-07T12:55:00Z
4
value 0.07927
scoring_system epss
scoring_elements 0.92044
published_at 2026-04-08T12:55:00Z
5
value 0.07927
scoring_system epss
scoring_elements 0.92047
published_at 2026-04-09T12:55:00Z
6
value 0.07927
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-12T12:55:00Z
7
value 0.07927
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-13T12:55:00Z
8
value 0.07927
scoring_system epss
scoring_elements 0.92066
published_at 2026-04-16T12:55:00Z
9
value 0.07927
scoring_system epss
scoring_elements 0.92063
published_at 2026-04-18T12:55:00Z
10
value 0.07927
scoring_system epss
scoring_elements 0.92061
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32567
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32567
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xh97-4sn5-vyfw
57
url VCID-xwdc-hndy-yubc
vulnerability_id VCID-xwdc-hndy-yubc
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9494
reference_id
reference_type
scores
0
value 0.03178
scoring_system epss
scoring_elements 0.86907
published_at 2026-04-01T12:55:00Z
1
value 0.03178
scoring_system epss
scoring_elements 0.86918
published_at 2026-04-02T12:55:00Z
2
value 0.03178
scoring_system epss
scoring_elements 0.86937
published_at 2026-04-04T12:55:00Z
3
value 0.03178
scoring_system epss
scoring_elements 0.8693
published_at 2026-04-07T12:55:00Z
4
value 0.03178
scoring_system epss
scoring_elements 0.8695
published_at 2026-04-08T12:55:00Z
5
value 0.03178
scoring_system epss
scoring_elements 0.86957
published_at 2026-04-09T12:55:00Z
6
value 0.03178
scoring_system epss
scoring_elements 0.86971
published_at 2026-04-11T12:55:00Z
7
value 0.03178
scoring_system epss
scoring_elements 0.86966
published_at 2026-04-12T12:55:00Z
8
value 0.03178
scoring_system epss
scoring_elements 0.8696
published_at 2026-04-13T12:55:00Z
9
value 0.03178
scoring_system epss
scoring_elements 0.86975
published_at 2026-04-16T12:55:00Z
10
value 0.03178
scoring_system epss
scoring_elements 0.86979
published_at 2026-04-18T12:55:00Z
11
value 0.03178
scoring_system epss
scoring_elements 0.86978
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9494
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963629
reference_id 963629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963629
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-9494
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwdc-hndy-yubc
58
url VCID-xwru-y5m9-gucd
vulnerability_id VCID-xwru-y5m9-gucd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31779
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44013
published_at 2026-04-02T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44036
published_at 2026-04-04T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72275
published_at 2026-04-07T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.72314
published_at 2026-04-08T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72326
published_at 2026-04-09T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72349
published_at 2026-04-11T12:55:00Z
6
value 0.0345
scoring_system epss
scoring_elements 0.87515
published_at 2026-04-12T12:55:00Z
7
value 0.0345
scoring_system epss
scoring_elements 0.87512
published_at 2026-04-13T12:55:00Z
8
value 0.0345
scoring_system epss
scoring_elements 0.87527
published_at 2026-04-21T12:55:00Z
9
value 0.0345
scoring_system epss
scoring_elements 0.87529
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31779
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-31779
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwru-y5m9-gucd
59
url VCID-zmh1-wmct-uyf7
vulnerability_id VCID-zmh1-wmct-uyf7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32565
reference_id
reference_type
scores
0
value 0.05675
scoring_system epss
scoring_elements 0.90351
published_at 2026-04-01T12:55:00Z
1
value 0.05675
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-02T12:55:00Z
2
value 0.05675
scoring_system epss
scoring_elements 0.90365
published_at 2026-04-04T12:55:00Z
3
value 0.05675
scoring_system epss
scoring_elements 0.90369
published_at 2026-04-07T12:55:00Z
4
value 0.05675
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-08T12:55:00Z
5
value 0.05675
scoring_system epss
scoring_elements 0.90389
published_at 2026-04-09T12:55:00Z
6
value 0.05675
scoring_system epss
scoring_elements 0.90397
published_at 2026-04-12T12:55:00Z
7
value 0.05675
scoring_system epss
scoring_elements 0.9039
published_at 2026-04-13T12:55:00Z
8
value 0.05675
scoring_system epss
scoring_elements 0.90406
published_at 2026-04-16T12:55:00Z
9
value 0.05675
scoring_system epss
scoring_elements 0.90405
published_at 2026-04-18T12:55:00Z
10
value 0.05675
scoring_system epss
scoring_elements 0.90403
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32565
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32565
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zmh1-wmct-uyf7
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@3.0.5-1