Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/76073?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "type": "ebuild", "namespace": "net-misc", "name": "asterisk", "version": "18.24.3", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "18.26.3", "latest_non_vulnerable_version": "18.26.3", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42484?format=api", "vulnerability_id": "VCID-4mns-yhyu-9kfq", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26714", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82149", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82162", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.8218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82206", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82213", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82255", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82256", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82277", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82289", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01688", "scoring_system": "epss", "scoring_elements": "0.82294", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26714" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2021-26714" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mns-yhyu-9kfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42496?format=api", "vulnerability_id": "VCID-55vv-7jsj-xqeh", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-49294", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.94971", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.94973", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.94976", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.94985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.94988", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.94993", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.94995", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.94997", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.95006", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.9501", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.95013", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.17085", "scoring_system": "epss", "scoring_elements": "0.95012", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-49294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059032", "reference_id": "1059032", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059032" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2023-49294" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55vv-7jsj-xqeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42485?format=api", "vulnerability_id": "VCID-6rhm-xrwe-x7af", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26717", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61969", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62001", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6202", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62046", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62067", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62073", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62055", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62052", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62069", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62062", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26717" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983157", "reference_id": "983157", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983157" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2021-26717" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6rhm-xrwe-x7af" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42489?format=api", "vulnerability_id": "VCID-7kus-4n4f-myd1", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61596", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61615", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.6165", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61619", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61651", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61644", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68302", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68306", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2022-26498" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7kus-4n4f-myd1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42490?format=api", "vulnerability_id": "VCID-8pdp-epea-juhj", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58287", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.6541", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65493", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65479", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65451", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65489", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.655", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65484", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65501", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71112", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71117", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2022-26499" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8pdp-epea-juhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42494?format=api", "vulnerability_id": "VCID-b4z5-5hbq-5ka8", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74306", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74262", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74272", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74264", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74298", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74307", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74181", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74208", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74214", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74228", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.7425", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74231", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0081", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706" }, { "reference_url": "https://downloads.asterisk.org/pub/security/AST-2022-009.html", "reference_id": "AST-2022-009.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/" } ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-009.html" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5358", "reference_id": "dsa-5358", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5358" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2022-42706" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4z5-5hbq-5ka8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42497?format=api", "vulnerability_id": "VCID-bk8r-brkr-bqc6", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-49786", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2674", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26749", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26693", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.267", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26631", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26575", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26567", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26494", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-49786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059033", "reference_id": "1059033", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059033" }, { "reference_url": "http://seclists.org/fulldisclosure/2023/Dec/24", "reference_id": "24", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/" } ], "url": "http://seclists.org/fulldisclosure/2023/Dec/24" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/12/15/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7" }, { "reference_url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html", "reference_id": "Asterisk-20.1.0-Denial-Of-Service.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/" } ], "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html" }, { "reference_url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05", "reference_id": "d7d7764cb07c8a1872804321302ef93bf62cba05", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/" } ], "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05" }, { "reference_url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race", "reference_id": "ES2023-01-asterisk-dtls-hello-race", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/" } ], "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race" }, { "reference_url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq", "reference_id": "GHSA-hxj9-xwr8-w8pq", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/" } ], "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html", "reference_id": "msg00019.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2023-49786" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bk8r-brkr-bqc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42495?format=api", "vulnerability_id": "VCID-bknu-abgc-bugw", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22375", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2242", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22208", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22365", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22324", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22265", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22269", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22263", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22215", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22065", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22053", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22039", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059303", "reference_id": "1059303", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059303" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2023-37457" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bknu-abgc-bugw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42492?format=api", "vulnerability_id": "VCID-cupt-538a-z3fp", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37325", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71669", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71624", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71629", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.7161", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.7166", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71664", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.7154", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.7158", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.7159", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71613", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0068", "scoring_system": "epss", "scoring_elements": "0.71579", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706" }, { "reference_url": "https://downloads.asterisk.org/pub/security/AST-2022-007.html", "reference_id": "AST-2022-007.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/" } ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-007.html" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5358", "reference_id": "dsa-5358", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5358" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2022-37325" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cupt-538a-z3fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42486?format=api", "vulnerability_id": "VCID-fjzf-5rtw-rqfj", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26906", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74184", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74217", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74232", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74235", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74227", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74265", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74275", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74267", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74302", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.74311", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00811", "scoring_system": "epss", "scoring_elements": "0.7431", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26906" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983159", "reference_id": "983159", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983159" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2021-26906" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjzf-5rtw-rqfj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42483?format=api", "vulnerability_id": "VCID-ge7t-fqyp-vyhz", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43675", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43756", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43689", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43743", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4373", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43775", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43699", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43636", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4364", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43557", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26713" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2021-26713" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ge7t-fqyp-vyhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42488?format=api", "vulnerability_id": "VCID-h193-vjhb-j3a3", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86214", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86224", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86242", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86261", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86283", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86279", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.863", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86294", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86312", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02875", "scoring_system": "epss", "scoring_elements": "0.86322", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991710", "reference_id": "991710", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991710" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2021-32558" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h193-vjhb-j3a3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42481?format=api", "vulnerability_id": "VCID-r8b9-jcqa-xyb2", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24665", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24741", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24781", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24553", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24625", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24671", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24645", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24589", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24602", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24592", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24513", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24499", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24458", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35776" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983158", "reference_id": "983158", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983158" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2020-35776" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8b9-jcqa-xyb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42482?format=api", "vulnerability_id": "VCID-xr4a-tmxe-8fcd", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26712", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87107", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87117", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87134", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87127", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87147", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87163", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87158", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87174", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87179", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87192", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0327", "scoring_system": "epss", "scoring_elements": "0.87198", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26712" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2021-26712" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xr4a-tmxe-8fcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42491?format=api", "vulnerability_id": "VCID-z3fq-m317-ckb8", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26651", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62891", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62921", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62936", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62952", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.6297", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62958", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62977", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.6831", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68313", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00685", "scoring_system": "epss", "scoring_elements": "0.71727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00685", "scoring_system": "epss", "scoring_elements": "0.71709", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00685", "scoring_system": "epss", "scoring_elements": "0.71758", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2022-26651" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3fq-m317-ckb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42493?format=api", "vulnerability_id": "VCID-zabf-adce-sqde", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42705", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81589", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.8155", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81551", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81553", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81575", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81584", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.8146", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81482", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81479", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81507", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.81533", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01567", "scoring_system": "epss", "scoring_elements": "0.8152", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706" }, { "reference_url": "https://downloads.asterisk.org/pub/security/AST-2022-008.html", "reference_id": "AST-2022-008.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/" } ], "url": "https://downloads.asterisk.org/pub/security/AST-2022-008.html" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5358", "reference_id": "dsa-5358", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5358" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2022-42705" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zabf-adce-sqde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42487?format=api", "vulnerability_id": "VCID-zv1p-p8tb-dqhm", "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31878", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40898", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40926", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40854", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.4091", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40927", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40892", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40873", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40915", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40884", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40712", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40699", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40617", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31878" }, { "reference_url": "https://security.gentoo.org/glsa/202412-03", "reference_id": "GLSA-202412-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api", "purl": "pkg:ebuild/net-misc/asterisk@18.24.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" } ], "aliases": [ "CVE-2021-31878" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zv1p-p8tb-dqhm" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3" }