Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/584807?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/584807?format=api", "purl": "pkg:deb/debian/asterisk@1:1.4.19.1~dfsg-1?distro=sid", "type": "deb", "namespace": "debian", "name": "asterisk", "version": "1:1.4.19.1~dfsg-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1:1.4.21.2~dfsg-1", "latest_non_vulnerable_version": "1:22.9.0+dfsg+~cs6.16.60671434-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90719?format=api", "vulnerability_id": "VCID-3gwr-t9bx-47cj", "summary": "asterisk: HTTP Manager ID is predictable (AST-2008-005)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1390.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1390.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1390", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.857", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85713", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85731", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85738", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85779", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85776", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85794", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02654", "scoring_system": "epss", "scoring_elements": "0.85799", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03015", "scoring_system": "epss", "scoring_elements": "0.86617", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03015", "scoring_system": "epss", "scoring_elements": "0.86636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03015", "scoring_system": "epss", "scoring_elements": "0.86644", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1390" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438131", "reference_id": "438131", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438131" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584807?format=api", "purl": "pkg:deb/debian/asterisk@1:1.4.19.1~dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.19.1~dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api", "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r54j-ydjm-4uca" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api", "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api", "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid" } ], "aliases": [ "CVE-2008-1390" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3gwr-t9bx-47cj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42647?format=api", "vulnerability_id": "VCID-re5z-334n-e7a2", "summary": "Multiple vulnerabilities have been found in Asterisk allowing for Denial of\n Service and username disclosure.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1897.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1897.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1897", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.8663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86641", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.8666", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86678", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86688", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86702", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86699", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86692", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86705", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86711", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86723", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03049", "scoring_system": "epss", "scoring_elements": "0.86732", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=443761", "reference_id": "443761", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=443761" }, { "reference_url": "https://security.gentoo.org/glsa/200905-01", "reference_id": "GLSA-200905-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200905-01" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584807?format=api", "purl": "pkg:deb/debian/asterisk@1:1.4.19.1~dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.19.1~dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api", "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r54j-ydjm-4uca" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api", "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api", "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid" } ], "aliases": [ "CVE-2008-1897" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-re5z-334n-e7a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91814?format=api", "vulnerability_id": "VCID-w94b-nwsf-wkg3", "summary": "The IAX2 channel driver (chan_iax2) in Asterisk 1.2 before revision 72630 and 1.4 before revision 65679, when configured to allow unauthenticated calls, sends \"early audio\" to an unverified source IP address of a NEW message, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed NEW message.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1923", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81217", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81226", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81276", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81281", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81301", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.8128", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81319", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81341", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81348", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1923" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584807?format=api", "purl": "pkg:deb/debian/asterisk@1:1.4.19.1~dfsg-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.19.1~dfsg-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582067?format=api", "purl": "pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-r54j-ydjm-4uca" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582068?format=api", "purl": "pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062442?format=api", "purl": "pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid" } ], "aliases": [ "CVE-2008-1923" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w94b-nwsf-wkg3" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.19.1~dfsg-1%3Fdistro=sid" }