Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/asterisk@1:1.6.2.9-2%2Bsqueeze1?distro=sid
Typedeb
Namespacedebian
Nameasterisk
Version1:1.6.2.9-2+squeeze1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:1.8.3.3-1
Latest_non_vulnerable_version1:22.9.0+dfsg+~cs6.16.60671434-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6yxw-veq3-eqgd
vulnerability_id VCID-6yxw-veq3-eqgd
summary Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0495
reference_id
reference_type
scores
0
value 0.00573
scoring_system epss
scoring_elements 0.68637
published_at 2026-04-01T12:55:00Z
1
value 0.00573
scoring_system epss
scoring_elements 0.68655
published_at 2026-04-02T12:55:00Z
2
value 0.00573
scoring_system epss
scoring_elements 0.68674
published_at 2026-04-04T12:55:00Z
3
value 0.00573
scoring_system epss
scoring_elements 0.68651
published_at 2026-04-07T12:55:00Z
4
value 0.00573
scoring_system epss
scoring_elements 0.68702
published_at 2026-04-08T12:55:00Z
5
value 0.00573
scoring_system epss
scoring_elements 0.6872
published_at 2026-04-09T12:55:00Z
6
value 0.00573
scoring_system epss
scoring_elements 0.68743
published_at 2026-04-11T12:55:00Z
7
value 0.00573
scoring_system epss
scoring_elements 0.68729
published_at 2026-04-12T12:55:00Z
8
value 0.00573
scoring_system epss
scoring_elements 0.687
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0495
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0495
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610487
reference_id 610487
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610487
fixed_packages
0
url pkg:deb/debian/asterisk@1:1.6.2.9-2%2Bsqueeze1?distro=sid
purl pkg:deb/debian/asterisk@1:1.6.2.9-2%2Bsqueeze1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.6.2.9-2%252Bsqueeze1%3Fdistro=sid
1
url pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
purl pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-r54j-ydjm-4uca
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid
2
url pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid
3
url pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
purl pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid
aliases CVE-2011-0495
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yxw-veq3-eqgd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.6.2.9-2%252Bsqueeze1%3Fdistro=sid