Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/asterisk@1:1.8.8.0~dfsg-1?distro=sid
Typedeb
Namespacedebian
Nameasterisk
Version1:1.8.8.0~dfsg-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:1.8.8.2~dfsg-1
Latest_non_vulnerable_version1:22.9.0+dfsg+~cs6.16.60671434-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-apn8-j2e8-uka5
vulnerability_id VCID-apn8-j2e8-uka5
summary The handle_request_info function in channels/chan_sip.c in Asterisk Open Source 1.6.2.x before 1.6.2.21 and 1.8.x before 1.8.7.2, when automon is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted sequence of SIP requests.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4598
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.70313
published_at 2026-04-01T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70326
published_at 2026-04-02T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70342
published_at 2026-04-04T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.7032
published_at 2026-04-07T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70365
published_at 2026-04-08T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.7038
published_at 2026-04-09T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70404
published_at 2026-04-11T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.70389
published_at 2026-04-12T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70375
published_at 2026-04-13T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70417
published_at 2026-04-16T12:55:00Z
10
value 0.00634
scoring_system epss
scoring_elements 0.70427
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4598
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4598
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651552
reference_id 651552
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651552
fixed_packages
0
url pkg:deb/debian/asterisk@1:1.8.8.0~dfsg-1?distro=sid
purl pkg:deb/debian/asterisk@1:1.8.8.0~dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.8.8.0~dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r54j-ydjm-4uca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid
2
url pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid
3
url pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid
aliases CVE-2011-4598
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apn8-j2e8-uka5
1
url VCID-nzu7-8h1d-mbbw
vulnerability_id VCID-nzu7-8h1d-mbbw
summary The SIP over UDP implementation in Asterisk Open Source 1.4.x before 1.4.43, 1.6.x before 1.6.2.21, and 1.8.x before 1.8.7.2 uses different port numbers for responses to invalid requests depending on whether a SIP username exists, which allows remote attackers to enumerate usernames via a series of requests.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4597
reference_id
reference_type
scores
0
value 0.00685
scoring_system epss
scoring_elements 0.71636
published_at 2026-04-01T12:55:00Z
1
value 0.00685
scoring_system epss
scoring_elements 0.71643
published_at 2026-04-02T12:55:00Z
2
value 0.00685
scoring_system epss
scoring_elements 0.71661
published_at 2026-04-04T12:55:00Z
3
value 0.00685
scoring_system epss
scoring_elements 0.71634
published_at 2026-04-07T12:55:00Z
4
value 0.00685
scoring_system epss
scoring_elements 0.71673
published_at 2026-04-08T12:55:00Z
5
value 0.00685
scoring_system epss
scoring_elements 0.71684
published_at 2026-04-09T12:55:00Z
6
value 0.00685
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-11T12:55:00Z
7
value 0.00685
scoring_system epss
scoring_elements 0.71691
published_at 2026-04-12T12:55:00Z
8
value 0.00685
scoring_system epss
scoring_elements 0.71672
published_at 2026-04-13T12:55:00Z
9
value 0.00685
scoring_system epss
scoring_elements 0.71716
published_at 2026-04-16T12:55:00Z
10
value 0.00685
scoring_system epss
scoring_elements 0.71722
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4597
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4597
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651552
reference_id 651552
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651552
fixed_packages
0
url pkg:deb/debian/asterisk@1:1.8.8.0~dfsg-1?distro=sid
purl pkg:deb/debian/asterisk@1:1.8.8.0~dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.8.8.0~dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r54j-ydjm-4uca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid
2
url pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid
3
url pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid
aliases CVE-2011-4597
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nzu7-8h1d-mbbw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.8.8.0~dfsg-1%3Fdistro=sid