Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/atftp@0.6.0woody1 |
| Type | deb |
| Namespace | debian |
| Name | atftp |
| Version | 0.6.0woody1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 0.7.git20120829-3.3+deb11u2 |
| Latest_non_vulnerable_version | 0.7.git20120829-3.3+deb11u2 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-4ufj-j1bk-97g2 |
| vulnerability_id |
VCID-4ufj-j1bk-97g2 |
| summary |
Multiple vulnerabilities have been found in atftp, the worst of
which could result in the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-11365 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.88004 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.87934 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.87944 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.87958 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.87962 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.87982 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.87989 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.88 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.87993 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.87992 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.03727 |
| scoring_system |
epss |
| scoring_elements |
0.88006 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-11365 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-11365
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4ufj-j1bk-97g2 |
|
| 1 |
| url |
VCID-8gv8-qwdd-5fd2 |
| vulnerability_id |
VCID-8gv8-qwdd-5fd2 |
| summary |
tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41054 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65302 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65292 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65176 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65226 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65251 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65217 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65267 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.6528 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65298 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65285 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00484 |
| scoring_system |
epss |
| scoring_elements |
0.65258 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41054 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-41054
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8gv8-qwdd-5fd2 |
|
| 2 |
| url |
VCID-nezw-twkd-8qaf |
| vulnerability_id |
VCID-nezw-twkd-8qaf |
| summary |
Buffer overflow in atftp daemon (atftpd) 0.6.1 and earlier, and possibly later versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long filename. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0380 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.94987 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.94997 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.94998 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.95001 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.95009 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.95013 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.95019 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.9502 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.95023 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.95032 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.17215 |
| scoring_system |
epss |
| scoring_elements |
0.95035 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-0380 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-0380
|
| risk_score |
0.4 |
| exploitability |
2.0 |
| weighted_severity |
0.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nezw-twkd-8qaf |
|
| 3 |
| url |
VCID-p7hs-4pdm-2qcw |
| vulnerability_id |
VCID-p7hs-4pdm-2qcw |
| summary |
options.c in atftp before 0.7.5 reads past the end of an array, and consequently discloses server-side /etc/group data to a remote client. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-46671 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.30992 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.30987 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.31111 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.31158 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.30977 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.31033 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.31062 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.31068 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.31024 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.30979 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0012 |
| scoring_system |
epss |
| scoring_elements |
0.3101 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-46671 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-46671
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p7hs-4pdm-2qcw |
|
| 4 |
| url |
VCID-qyq7-c3vf-bbew |
| vulnerability_id |
VCID-qyq7-c3vf-bbew |
| summary |
Multiple vulnerabilities have been found in atftp, the worst of
which could result in the execution of arbitrary code. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-11366 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.7962 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79542 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79548 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.7957 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79586 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79594 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79615 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79599 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79592 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01282 |
| scoring_system |
epss |
| scoring_elements |
0.79621 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-11366 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-11366
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qyq7-c3vf-bbew |
|
| 5 |
| url |
VCID-r2dj-7m5m-7fgq |
| vulnerability_id |
VCID-r2dj-7m5m-7fgq |
| summary |
An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-6097 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52314 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5231 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52168 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52212 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52239 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52257 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52252 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52303 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52286 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52272 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-6097 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-6097
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r2dj-7m5m-7fgq |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/atftp@0.6.0woody1 |