Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/erlang@1:27.3.4.9%2Bdfsg-1
Typedeb
Namespacedebian
Nameerlang
Version1:27.3.4.9+dfsg-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-gcn7-ak4r-eba3
vulnerability_id VCID-gcn7-ak4r-eba3
summary
Incorrect Authorization vulnerability in Erlang OTP (inets modules) allows unauthenticated access to CGI scripts protected by directory rules when served via script_alias.

When script_alias maps a URL prefix to a directory outside DocumentRoot, mod_auth evaluates directory-based access controls against the DocumentRoot-relative path while mod_cgi executes the script at the ScriptAlias-resolved path. This path mismatch allows unauthenticated access to CGI scripts that directory rules were meant to protect.

This vulnerability is associated with program files lib/inets/src/http_server/mod_alias.erl, lib/inets/src/http_server/mod_auth.erl, and lib/inets/src/http_server/mod_cgi.erl.

This issue affects OTP from OTP 17.0 until OTP 28.4.2, 27.3.4.10 and 26.2.5.19 corresponding to inets from 5.10 until 9.6.2, 9.3.2.4 and 9.1.0.6.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28808.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28808
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05678
published_at 2026-04-21T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15168
published_at 2026-04-08T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15151
published_at 2026-04-12T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15189
published_at 2026-04-11T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.1522
published_at 2026-04-09T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20002
published_at 2026-04-13T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19986
published_at 2026-04-18T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19983
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28808
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455909
reference_id 2455909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455909
5
reference_url https://github.com/erlang/otp/commit/8fc71ac6af4fbcc54103bec2983ef22e82942688
reference_id 8fc71ac6af4fbcc54103bec2983ef22e82942688
reference_type
scores
0
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-07T13:14:10Z/
url https://github.com/erlang/otp/commit/8fc71ac6af4fbcc54103bec2983ef22e82942688
6
reference_url https://github.com/erlang/otp/commit/9dfa0c51eac97866078e808dec2183cb7871ff7c
reference_id 9dfa0c51eac97866078e808dec2183cb7871ff7c
reference_type
scores
0
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-07T13:14:10Z/
url https://github.com/erlang/otp/commit/9dfa0c51eac97866078e808dec2183cb7871ff7c
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
8
reference_url https://cna.erlef.org/cves/CVE-2026-28808.html
reference_id CVE-2026-28808.html
reference_type
scores
0
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-07T13:14:10Z/
url https://cna.erlef.org/cves/CVE-2026-28808.html
9
reference_url https://osv.dev/vulnerability/EEF-CVE-2026-28808
reference_id EEF-CVE-2026-28808
reference_type
scores
0
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-07T13:14:10Z/
url https://osv.dev/vulnerability/EEF-CVE-2026-28808
10
reference_url https://github.com/erlang/otp/security/advisories/GHSA-3vhp-h532-mc3f
reference_id GHSA-3vhp-h532-mc3f
reference_type
scores
0
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-07T13:14:10Z/
url https://github.com/erlang/otp/security/advisories/GHSA-3vhp-h532-mc3f
11
reference_url https://www.erlang.org/doc/system/versions.html#order-of-versions
reference_id versions.html#order-of-versions
reference_type
scores
0
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-07T13:14:10Z/
url https://www.erlang.org/doc/system/versions.html#order-of-versions
fixed_packages
0
url pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1
purl pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c47m-8h7d-afaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.10%252Bdfsg-1
aliases CVE-2026-28808
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcn7-ak4r-eba3
1
url VCID-j7t3-nrjj-pfgp
vulnerability_id VCID-j7t3-nrjj-pfgp
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28810.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28810
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15583
published_at 2026-04-07T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15668
published_at 2026-04-08T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.1566
published_at 2026-04-12T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15695
published_at 2026-04-11T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15727
published_at 2026-04-09T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20501
published_at 2026-04-16T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.2051
published_at 2026-04-13T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20496
published_at 2026-04-21T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20499
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28810
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455868
reference_id 2455868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455868
5
reference_url https://github.com/erlang/otp/commit/36f23c9d2cc54afe83671dd7343596d7972839a5
reference_id 36f23c9d2cc54afe83671dd7343596d7972839a5
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T16:27:52Z/
url https://github.com/erlang/otp/commit/36f23c9d2cc54afe83671dd7343596d7972839a5
6
reference_url https://github.com/erlang/otp/commit/b057a9d995017b1be50d6dc02edd52382f3231b8
reference_id b057a9d995017b1be50d6dc02edd52382f3231b8
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T16:27:52Z/
url https://github.com/erlang/otp/commit/b057a9d995017b1be50d6dc02edd52382f3231b8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
8
reference_url https://cna.erlef.org/cves/CVE-2026-28810.html
reference_id CVE-2026-28810.html
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T16:27:52Z/
url https://cna.erlef.org/cves/CVE-2026-28810.html
9
reference_url https://github.com/erlang/otp/commit/dd15e8eb03548c5e55e9915f0e91389ec6bad9fd
reference_id dd15e8eb03548c5e55e9915f0e91389ec6bad9fd
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T16:27:52Z/
url https://github.com/erlang/otp/commit/dd15e8eb03548c5e55e9915f0e91389ec6bad9fd
10
reference_url https://osv.dev/vulnerability/EEF-CVE-2026-28810
reference_id EEF-CVE-2026-28810
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T16:27:52Z/
url https://osv.dev/vulnerability/EEF-CVE-2026-28810
11
reference_url https://github.com/erlang/otp/security/advisories/GHSA-v884-5jg5-whj8
reference_id GHSA-v884-5jg5-whj8
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T16:27:52Z/
url https://github.com/erlang/otp/security/advisories/GHSA-v884-5jg5-whj8
12
reference_url https://www.erlang.org/doc/system/versions.html#order-of-versions
reference_id versions.html#order-of-versions
reference_type
scores
0
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T16:27:52Z/
url https://www.erlang.org/doc/system/versions.html#order-of-versions
fixed_packages
0
url pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1
purl pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c47m-8h7d-afaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.10%252Bdfsg-1
aliases CVE-2026-28810
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j7t3-nrjj-pfgp
2
url VCID-zegc-rj1x-ryau
vulnerability_id VCID-zegc-rj1x-ryau
summary
Improper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows OCSP designated-responder authorization bypass via missing signature verification.

The OCSP response validation in public_key:pkix_ocsp_validate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA. Instead, it only checks that the responder certificate's issuer name matches the CA's subject name and that the certificate has the OCSPSigning extended key usage. An attacker who can intercept or control OCSP responses can create a self-signed certificate with a matching issuer name and the OCSPSigning EKU, and use it to forge OCSP responses that mark revoked certificates as valid.

This affects SSL/TLS clients using OCSP stapling, which may accept connections to servers with revoked certificates, potentially transmitting sensitive data to compromised servers. Applications using the public_key:pkix_ocsp_validate/5 API directly are also affected, with impact depending on usage context.

This vulnerability is associated with program files lib/public_key/src/pubkey_ocsp.erl and program routines pubkey_ocsp:is_authorized_responder/3.

This issue affects OTP from OTP 27.0 until OTP 28.4.2 and 27.3.4.10 corresponding to public_key from 1.16 until 1.20.3 and 1.17.1.2, and ssl from 11.2 until 11.5.4 and 11.2.12.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32144.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32144
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10169
published_at 2026-04-08T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10225
published_at 2026-04-12T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10265
published_at 2026-04-11T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10229
published_at 2026-04-09T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13826
published_at 2026-04-16T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13923
published_at 2026-04-13T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13891
published_at 2026-04-21T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.1382
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32144
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455896
reference_id 2455896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455896
4
reference_url https://github.com/erlang/otp/commit/49033a6d93a5be0ee0dce04e1fb8b4ae7de1e0c0
reference_id 49033a6d93a5be0ee0dce04e1fb8b4ae7de1e0c0
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://github.com/erlang/otp/commit/49033a6d93a5be0ee0dce04e1fb8b4ae7de1e0c0
5
reference_url https://github.com/erlang/otp/commit/ac7ff528be857c5d35eb29c7f24106e3a16d4891
reference_id ac7ff528be857c5d35eb29c7f24106e3a16d4891
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://github.com/erlang/otp/commit/ac7ff528be857c5d35eb29c7f24106e3a16d4891
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
7
reference_url https://cna.erlef.org/cves/CVE-2026-32144.html
reference_id CVE-2026-32144.html
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://cna.erlef.org/cves/CVE-2026-32144.html
8
reference_url https://osv.dev/vulnerability/EEF-CVE-2026-32144
reference_id EEF-CVE-2026-32144
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://osv.dev/vulnerability/EEF-CVE-2026-32144
9
reference_url https://github.com/erlang/otp/security/advisories/GHSA-gxrm-pf64-99xm
reference_id GHSA-gxrm-pf64-99xm
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://github.com/erlang/otp/security/advisories/GHSA-gxrm-pf64-99xm
10
reference_url https://www.erlang.org/doc/system/versions.html#order-of-versions
reference_id versions.html#order-of-versions
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://www.erlang.org/doc/system/versions.html#order-of-versions
fixed_packages
0
url pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1
purl pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c47m-8h7d-afaz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.10%252Bdfsg-1
aliases CVE-2026-32144
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zegc-rj1x-ryau
Fixing_vulnerabilities
Risk_score3.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.9%252Bdfsg-1