Lookup for vulnerable packages by Package URL.

GET /api/packages/583278?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "asterisk",
    "version": "0",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "0.5.0",
    "latest_non_vulnerable_version": "1:22.9.0+dfsg+~cs6.16.60671434-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/150632?format=api",
            "vulnerability_id": "VCID-1bxe-fg62-qugd",
            "summary": "The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.",
            "references": [
                {
                    "reference_url": "http://downloads.asterisk.org/pub/security/AST-2014-009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://downloads.asterisk.org/pub/security/AST-2014-009.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73972",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73921",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73931",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73956",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73927",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73961",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73975",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73999",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73981",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6609"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.4.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.5.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6609",
                    "reference_id": "CVE-2014-6609",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6609"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-6609"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1bxe-fg62-qugd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/214753?format=api",
            "vulnerability_id": "VCID-1t3u-22gq-qucr",
            "summary": "Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35190",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5608",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56054",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56074",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56053",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56104",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56109",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5612",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56097",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35190"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/pull/600",
                    "reference_id": "600",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-17T19:33:53Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/pull/600"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/pull/602",
                    "reference_id": "602",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-17T19:33:53Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/pull/602"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d",
                    "reference_id": "85241bd22936cc15760fd1f65d16c98be7aeaf6d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-17T19:33:53Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9",
                    "reference_id": "GHSA-qqxj-v78h-hrf9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-17T19:33:53Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-35190"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1t3u-22gq-qucr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/196629?format=api",
            "vulnerability_id": "VCID-2xc3-aqh8-cubn",
            "summary": "main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.",
            "references": [
                {
                    "reference_url": "http://downloads.asterisk.org/pub/security/AST-2019-005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://downloads.asterisk.org/pub/security/AST-2019-005.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92526",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92524",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92484",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9249",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92499",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92502",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92513",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92518",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15639"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15639",
                    "reference_id": "CVE-2019-15639",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15639"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2019-15639"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2xc3-aqh8-cubn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88203?format=api",
            "vulnerability_id": "VCID-3r26-8d9e-aqdm",
            "summary": "asterisk: remote crash in SIP channel driver (AST-2009-002)",
            "references": [
                {
                    "reference_url": "http://bugs.digium.com/view.php?id=13547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.digium.com/view.php?id=13547"
                },
                {
                    "reference_url": "http://bugs.digium.com/view.php?id=14417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.digium.com/view.php?id=14417"
                },
                {
                    "reference_url": "http://downloads.digium.com/pub/security/AST-2009-002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://downloads.digium.com/pub/security/AST-2009-002.html"
                },
                {
                    "reference_url": "http://osvdb.org/52568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/52568"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0871.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0871.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86448",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86382",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86393",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8641",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86412",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8643",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8644",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86454",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02947",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86453",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0871"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34229"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/501656/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/501656/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/34070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/34070"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021834",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021834"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0667"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=489725",
                    "reference_id": "489725",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489725"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0871",
                    "reference_id": "CVE-2009-0871",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0871"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2009-0871"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3r26-8d9e-aqdm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/148795?format=api",
            "vulnerability_id": "VCID-4658-u85z-zqhh",
            "summary": "The Publish/Subscribe Framework in the PJSIP channel driver in Asterisk Open Source 12.x before 12.3.1, when sub_min_expiry is set to zero, allows remote attackers to cause a denial of service (assertion failure and crash) via an unsubscribe request when not subscribed to the device.",
            "references": [
                {
                    "reference_url": "http://downloads.asterisk.org/pub/security/AST-2014-005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://downloads.asterisk.org/pub/security/AST-2014-005.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/127087/Asterisk-Project-Security-Advisory-AST-2014-005.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82573",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82507",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82522",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82537",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82533",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82559",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82567",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82586",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82579",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4045"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/532414/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/532414/100/0/threaded"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4045",
                    "reference_id": "CVE-2014-4045",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4045"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-4045"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4658-u85z-zqhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/140927?format=api",
            "vulnerability_id": "VCID-81tr-5yzn-m7ap",
            "summary": "chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open Source 10.x before 10.5.1 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by sending a Station Key Pad Button message and closing a connection in off-hook mode, a related issue to CVE-2012-2948.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21098",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2125",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21303",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21056",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21136",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21197",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21208",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21165",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21114",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3553"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2012-3553"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81tr-5yzn-m7ap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/148796?format=api",
            "vulnerability_id": "VCID-a4na-u27r-sfc5",
            "summary": "The PJSIP Channel Driver in Asterisk Open Source before 12.3.1 allows remote attackers to cause a denial of service (deadlock) by terminating a subscription request before it is complete, which triggers a SIP transaction timeout.",
            "references": [
                {
                    "reference_url": "http://downloads.asterisk.org/pub/security/AST-2014-008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://downloads.asterisk.org/pub/security/AST-2014-008.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/127090/Asterisk-Project-Security-Advisory-AST-2014-008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/127090/Asterisk-Project-Security-Advisory-AST-2014-008.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81926",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8186",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81871",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81894",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8189",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81917",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81923",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81943",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81931",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4048"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/532416/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/532416/100/0/threaded"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.2.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:12.3.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4048",
                    "reference_id": "CVE-2014-4048",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4048"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-4048"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a4na-u27r-sfc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59570?format=api",
            "vulnerability_id": "VCID-agez-w3xn-63bt",
            "summary": "Multiple buffer overflows in Asterisk might allow remote attackers\n    to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2288",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91742",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9175",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91756",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91764",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91776",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91783",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91786",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91788",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07478",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91784",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2288"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-05",
                    "reference_id": "GLSA-201405-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-05"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-2288"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-agez-w3xn-63bt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49296?format=api",
            "vulnerability_id": "VCID-an47-cxfn-77e8",
            "summary": "Multiple vulnerabilities have been found in Asterisk, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://downloads.asterisk.org/pub/security/AST-2013-001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://downloads.asterisk.org/pub/security/AST-2013-001.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92587",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92551",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92557",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92564",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92566",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92577",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92582",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92588",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2685"
                },
                {
                    "reference_url": "https://issues.asterisk.org/jira/browse/ASTERISK-20901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.asterisk.org/jira/browse/ASTERISK-20901"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:beta1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.0.0:beta1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:beta1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:beta2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.0.0:beta2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:beta2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.0.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.0.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.1.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.1.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.2.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.2.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:asterisk:open_source:11.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:asterisk:open_source:11.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2685",
                    "reference_id": "CVE-2013-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2685"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-15",
                    "reference_id": "GLSA-201401-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2013-2685"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-an47-cxfn-77e8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42483?format=api",
            "vulnerability_id": "VCID-ge7t-fqyp-vyhz",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43675",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43731",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43756",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43689",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43743",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4373",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43714",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26713"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-26713"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ge7t-fqyp-vyhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/164219?format=api",
            "vulnerability_id": "VCID-jez3-sw2r-r3d6",
            "summary": "An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x before 13.13.1 and 14.x before 14.2.1. If an SDP offer or answer is received with the Opus codec and with the format parameters separated using a space the code responsible for parsing will recursively call itself until it crashes. This occurs as the code does not properly handle spaces separating the parameters. This does NOT require the endpoint to have Opus configured in Asterisk. This also does not require the endpoint to be authenticated. If guest is enabled for chan_sip or anonymous in chan_pjsip an SDP offer or answer is still processed and the crash occurs.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56846",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56941",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56963",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56939",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5699",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5698",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56956",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9937"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2016-9937"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jez3-sw2r-r3d6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/176824?format=api",
            "vulnerability_id": "VCID-mmng-tcuj-wkhu",
            "summary": "An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable.",
            "references": [
                {
                    "reference_url": "http://downloads.asterisk.org/pub/security/AST-2018-007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://downloads.asterisk.org/pub/security/AST-2018-007.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62085",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62106",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61958",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62029",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62097",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62117",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12228"
                },
                {
                    "reference_url": "https://issues.asterisk.org/jira/browse/ASTERISK-27807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.asterisk.org/jira/browse/ASTERISK-27807"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104457"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12228",
                    "reference_id": "CVE-2018-12228",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12228"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-12228"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mmng-tcuj-wkhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/120836?format=api",
            "vulnerability_id": "VCID-pjwr-x9hp-g7dk",
            "summary": "Asterisk Open Source 1.4.5 through 1.4.11, when configured to use an IMAP voicemail storage backend, allows remote attackers to cause a denial of service via an e-mail with an \"invalid/corrupted\" MIME body, which triggers a crash when the recipient listens to voicemail.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4521",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85042",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85055",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85076",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85098",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85105",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8512",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85118",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85115",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4521"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2007-4521"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pjwr-x9hp-g7dk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56275?format=api",
            "vulnerability_id": "VCID-q3py-mykt-4kax",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39269",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39245",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41348",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41394",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41362",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41315",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41366",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41373",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49832"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110317",
                    "reference_id": "1110317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110317"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-mrq5-74j5-f5cr",
                    "reference_id": "GHSA-mrq5-74j5-f5cr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-01T18:28:56Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-mrq5-74j5-f5cr"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202601-04",
                    "reference_id": "GLSA-202601-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202601-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583856?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.5.1~dfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.5.1~dfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2025-49832"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3py-mykt-4kax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56276?format=api",
            "vulnerability_id": "VCID-tmja-qaa1-8kex",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-57767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26876",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2707",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26861",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26929",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26976",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26979",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26934",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28205",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-57767"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/commit/02993717b08f899d4aca9888062f35dfb198584f",
                    "reference_id": "02993717b08f899d4aca9888062f35dfb198584f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-28T17:12:27Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/commit/02993717b08f899d4aca9888062f35dfb198584f"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1112470",
                    "reference_id": "1112470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1112470"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/pull/1407",
                    "reference_id": "1407",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-28T17:12:27Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/pull/1407"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-64qc-9x89-rx5j",
                    "reference_id": "GHSA-64qc-9x89-rx5j",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-28T17:12:27Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-64qc-9x89-rx5j"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202601-04",
                    "reference_id": "GLSA-202601-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202601-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585478?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.5.2~dfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.5.2~dfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2025-57767"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmja-qaa1-8kex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/188212?format=api",
            "vulnerability_id": "VCID-ttmk-fs9h-hufh",
            "summary": "An issue was discovered in res_http_websocket.c in Asterisk 15.x through 15.2.1. If the HTTP server is enabled (default is disabled), WebSocket payloads of size 0 are mishandled (with a busy loop).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96867",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96874",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96884",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96892",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96896",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96898",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.33107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96899",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7287"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-7287"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ttmk-fs9h-hufh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31366?format=api",
            "vulnerability_id": "VCID-tw8d-u845-r3dq",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64356",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64385",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64344",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64393",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64408",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6442",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64379",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24754"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24754"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47",
                    "reference_id": "d27f79da11df7bc8bb56c2f291d71e54df8d2c47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662",
                    "reference_id": "GHSA-73f7-48m9-w662",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html",
                    "reference_id": "msg00035.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-24754"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tw8d-u845-r3dq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59571?format=api",
            "vulnerability_id": "VCID-wbrs-de57-1bd9",
            "summary": "Multiple buffer overflows in Asterisk might allow remote attackers\n    to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87898",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87908",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87922",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87925",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87946",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87952",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87963",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87955",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2289"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-05",
                    "reference_id": "GLSA-201405-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-05"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2014-2289"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbrs-de57-1bd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/180615?format=api",
            "vulnerability_id": "VCID-xcpx-unz5-gqbp",
            "summary": "Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed length.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87266",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87276",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87292",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8729",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87309",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87317",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87329",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87323",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87319",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19278"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-19278"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xcpx-unz5-gqbp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42482?format=api",
            "vulnerability_id": "VCID-xr4a-tmxe-8fcd",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87107",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87117",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87134",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87147",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87168",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87163",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87158",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26712"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-26712"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xr4a-tmxe-8fcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/188210?format=api",
            "vulnerability_id": "VCID-yyjj-7dwq-nueq",
            "summary": "A NULL pointer access issue was discovered in Asterisk 15.x through 15.2.1. The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number, these desired ones are still stored internally. When an RTP packet was received, this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example, the payload number resulted in a video codec but the stream carried audio), a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of that type would always exist.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67391",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67427",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67448",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67479",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67493",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67516",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67503",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67469",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7285"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-7285"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyjj-7dwq-nueq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42487?format=api",
            "vulnerability_id": "VCID-zv1p-p8tb-dqhm",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40898",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40926",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40854",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40904",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4091",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40927",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40892",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40873",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31878"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583278?format=api",
                    "purl": "pkg:deb/debian/asterisk@0?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-r54j-ydjm-4uca"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api",
                    "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2021-31878"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zv1p-p8tb-dqhm"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@0%3Fdistro=sid"
}