Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/erlang@0?distro=trixie
Typedeb
Namespacedebian
Nameerlang
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:14.b.3-dfsg-1
Latest_non_vulnerable_version1:27.3.4.10+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-m8hy-2shf-fqf2
vulnerability_id VCID-m8hy-2shf-fqf2
summary erlang: ssl fails to validate incorrect extened key usage
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53846.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-53846
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1276
published_at 2026-04-21T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12738
published_at 2026-04-13T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.1264
published_at 2026-04-16T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12648
published_at 2026-04-18T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12871
published_at 2026-04-02T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12922
published_at 2026-04-04T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12724
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12804
published_at 2026-04-08T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12854
published_at 2026-04-09T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.1282
published_at 2026-04-11T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12784
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-53846
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2330624
reference_id 2330624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2330624
4
reference_url https://github.com/erlang/otp/security/advisories/GHSA-qw6r-qh9v-638v
reference_id GHSA-qw6r-qh9v-638v
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-06T16:04:29Z/
url https://github.com/erlang/otp/security/advisories/GHSA-qw6r-qh9v-638v
5
reference_url https://usn.ubuntu.com/7961-1/
reference_id USN-7961-1
reference_type
scores
url https://usn.ubuntu.com/7961-1/
fixed_packages
0
url pkg:deb/debian/erlang@0?distro=trixie
purl pkg:deb/debian/erlang@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@0%3Fdistro=trixie
1
url pkg:deb/debian/erlang@1:23.2.6%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/erlang@1:23.2.6%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28fj-t5hy-x3gn
1
vulnerability VCID-gcn7-ak4r-eba3
2
vulnerability VCID-h1k4-x8vr-5bch
3
vulnerability VCID-j7t3-nrjj-pfgp
4
vulnerability VCID-s9qn-9qdm-j7ej
5
vulnerability VCID-w9yj-xg82-kyac
6
vulnerability VCID-wwcj-hwqc-f3g7
7
vulnerability VCID-xcks-117s-v3dd
8
vulnerability VCID-z6gs-aq96-gkaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:23.2.6%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/erlang@1:25.2.3%2Bdfsg-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/erlang@1:25.2.3%2Bdfsg-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1283-nvxm-r7cw
1
vulnerability VCID-28fj-t5hy-x3gn
2
vulnerability VCID-c3vm-u9jn-83cs
3
vulnerability VCID-gcn7-ak4r-eba3
4
vulnerability VCID-h1k4-x8vr-5bch
5
vulnerability VCID-j7t3-nrjj-pfgp
6
vulnerability VCID-jxzt-8wru-6yhk
7
vulnerability VCID-s9qn-9qdm-j7ej
8
vulnerability VCID-w9yj-xg82-kyac
9
vulnerability VCID-wwcj-hwqc-f3g7
10
vulnerability VCID-xcks-117s-v3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:25.2.3%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/erlang@1:27.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/erlang@1:27.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.2%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/erlang@1:27.3.4.1%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/erlang@1:27.3.4.1%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gcn7-ak4r-eba3
1
vulnerability VCID-h1k4-x8vr-5bch
2
vulnerability VCID-j7t3-nrjj-pfgp
3
vulnerability VCID-s9qn-9qdm-j7ej
4
vulnerability VCID-w9yj-xg82-kyac
5
vulnerability VCID-wwcj-hwqc-f3g7
6
vulnerability VCID-zegc-rj1x-ryau
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.1%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/erlang@1:27.3.4.9%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/erlang@1:27.3.4.9%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gcn7-ak4r-eba3
1
vulnerability VCID-j7t3-nrjj-pfgp
2
vulnerability VCID-zegc-rj1x-ryau
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.9%252Bdfsg-1%3Fdistro=trixie
6
url pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.10%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2024-53846
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8hy-2shf-fqf2
1
url VCID-tba3-4nap-wqdr
vulnerability_id VCID-tba3-4nap-wqdr
summary A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29221
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11555
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.1168
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11724
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11509
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11595
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11655
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11665
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11629
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11602
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11464
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11466
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11592
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29221
fixed_packages
0
url pkg:deb/debian/erlang@0?distro=trixie
purl pkg:deb/debian/erlang@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@0%3Fdistro=trixie
1
url pkg:deb/debian/erlang@1:23.2.6%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/erlang@1:23.2.6%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28fj-t5hy-x3gn
1
vulnerability VCID-gcn7-ak4r-eba3
2
vulnerability VCID-h1k4-x8vr-5bch
3
vulnerability VCID-j7t3-nrjj-pfgp
4
vulnerability VCID-s9qn-9qdm-j7ej
5
vulnerability VCID-w9yj-xg82-kyac
6
vulnerability VCID-wwcj-hwqc-f3g7
7
vulnerability VCID-xcks-117s-v3dd
8
vulnerability VCID-z6gs-aq96-gkaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:23.2.6%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/erlang@1:25.2.3%2Bdfsg-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/erlang@1:25.2.3%2Bdfsg-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1283-nvxm-r7cw
1
vulnerability VCID-28fj-t5hy-x3gn
2
vulnerability VCID-c3vm-u9jn-83cs
3
vulnerability VCID-gcn7-ak4r-eba3
4
vulnerability VCID-h1k4-x8vr-5bch
5
vulnerability VCID-j7t3-nrjj-pfgp
6
vulnerability VCID-jxzt-8wru-6yhk
7
vulnerability VCID-s9qn-9qdm-j7ej
8
vulnerability VCID-w9yj-xg82-kyac
9
vulnerability VCID-wwcj-hwqc-f3g7
10
vulnerability VCID-xcks-117s-v3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:25.2.3%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/erlang@1:27.3.4.1%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/erlang@1:27.3.4.1%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gcn7-ak4r-eba3
1
vulnerability VCID-h1k4-x8vr-5bch
2
vulnerability VCID-j7t3-nrjj-pfgp
3
vulnerability VCID-s9qn-9qdm-j7ej
4
vulnerability VCID-w9yj-xg82-kyac
5
vulnerability VCID-wwcj-hwqc-f3g7
6
vulnerability VCID-zegc-rj1x-ryau
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.1%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/erlang@1:27.3.4.9%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/erlang@1:27.3.4.9%2Bdfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gcn7-ak4r-eba3
1
vulnerability VCID-j7t3-nrjj-pfgp
2
vulnerability VCID-zegc-rj1x-ryau
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.9%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.10%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-29221
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tba3-4nap-wqdr
2
url VCID-zegc-rj1x-ryau
vulnerability_id VCID-zegc-rj1x-ryau
summary
Improper Certificate Validation vulnerability in Erlang OTP public_key (pubkey_ocsp module) allows OCSP designated-responder authorization bypass via missing signature verification.

The OCSP response validation in public_key:pkix_ocsp_validate/5 does not verify that a CA-designated responder certificate was cryptographically signed by the issuing CA. Instead, it only checks that the responder certificate's issuer name matches the CA's subject name and that the certificate has the OCSPSigning extended key usage. An attacker who can intercept or control OCSP responses can create a self-signed certificate with a matching issuer name and the OCSPSigning EKU, and use it to forge OCSP responses that mark revoked certificates as valid.

This affects SSL/TLS clients using OCSP stapling, which may accept connections to servers with revoked certificates, potentially transmitting sensitive data to compromised servers. Applications using the public_key:pkix_ocsp_validate/5 API directly are also affected, with impact depending on usage context.

This vulnerability is associated with program files lib/public_key/src/pubkey_ocsp.erl and program routines pubkey_ocsp:is_authorized_responder/3.

This issue affects OTP from OTP 27.0 until OTP 28.4.2 and 27.3.4.10 corresponding to public_key from 1.16 until 1.20.3 and 1.17.1.2, and ssl from 11.2 until 11.5.4 and 11.2.12.7.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32144.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32144
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10169
published_at 2026-04-08T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10225
published_at 2026-04-12T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10265
published_at 2026-04-11T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10229
published_at 2026-04-09T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13826
published_at 2026-04-16T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13923
published_at 2026-04-13T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13891
published_at 2026-04-21T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.1382
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32144
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455896
reference_id 2455896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455896
4
reference_url https://github.com/erlang/otp/commit/49033a6d93a5be0ee0dce04e1fb8b4ae7de1e0c0
reference_id 49033a6d93a5be0ee0dce04e1fb8b4ae7de1e0c0
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://github.com/erlang/otp/commit/49033a6d93a5be0ee0dce04e1fb8b4ae7de1e0c0
5
reference_url https://github.com/erlang/otp/commit/ac7ff528be857c5d35eb29c7f24106e3a16d4891
reference_id ac7ff528be857c5d35eb29c7f24106e3a16d4891
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://github.com/erlang/otp/commit/ac7ff528be857c5d35eb29c7f24106e3a16d4891
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:erlang:erlang\/otp:*:*:*:*:*:*:*:*
7
reference_url https://cna.erlef.org/cves/CVE-2026-32144.html
reference_id CVE-2026-32144.html
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://cna.erlef.org/cves/CVE-2026-32144.html
8
reference_url https://osv.dev/vulnerability/EEF-CVE-2026-32144
reference_id EEF-CVE-2026-32144
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://osv.dev/vulnerability/EEF-CVE-2026-32144
9
reference_url https://github.com/erlang/otp/security/advisories/GHSA-gxrm-pf64-99xm
reference_id GHSA-gxrm-pf64-99xm
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://github.com/erlang/otp/security/advisories/GHSA-gxrm-pf64-99xm
10
reference_url https://www.erlang.org/doc/system/versions.html#order-of-versions
reference_id versions.html#order-of-versions
reference_type
scores
0
value 7.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T13:15:14Z/
url https://www.erlang.org/doc/system/versions.html#order-of-versions
fixed_packages
0
url pkg:deb/debian/erlang@0?distro=trixie
purl pkg:deb/debian/erlang@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@0%3Fdistro=trixie
1
url pkg:deb/debian/erlang@1:23.2.6%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/erlang@1:23.2.6%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-28fj-t5hy-x3gn
1
vulnerability VCID-gcn7-ak4r-eba3
2
vulnerability VCID-h1k4-x8vr-5bch
3
vulnerability VCID-j7t3-nrjj-pfgp
4
vulnerability VCID-s9qn-9qdm-j7ej
5
vulnerability VCID-w9yj-xg82-kyac
6
vulnerability VCID-wwcj-hwqc-f3g7
7
vulnerability VCID-xcks-117s-v3dd
8
vulnerability VCID-z6gs-aq96-gkaw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:23.2.6%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/erlang@1:25.2.3%2Bdfsg-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/erlang@1:25.2.3%2Bdfsg-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1283-nvxm-r7cw
1
vulnerability VCID-28fj-t5hy-x3gn
2
vulnerability VCID-c3vm-u9jn-83cs
3
vulnerability VCID-gcn7-ak4r-eba3
4
vulnerability VCID-h1k4-x8vr-5bch
5
vulnerability VCID-j7t3-nrjj-pfgp
6
vulnerability VCID-jxzt-8wru-6yhk
7
vulnerability VCID-s9qn-9qdm-j7ej
8
vulnerability VCID-w9yj-xg82-kyac
9
vulnerability VCID-wwcj-hwqc-f3g7
10
vulnerability VCID-xcks-117s-v3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:25.2.3%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/erlang@1:27.3.4.10%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@1:27.3.4.10%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2026-32144
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zegc-rj1x-ryau
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/erlang@0%3Fdistro=trixie