Lookup for vulnerable packages by Package URL.

GET /api/packages/76073?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
    "type": "ebuild",
    "namespace": "net-misc",
    "name": "asterisk",
    "version": "18.24.3",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "18.26.3",
    "latest_non_vulnerable_version": "18.26.3",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42484?format=api",
            "vulnerability_id": "VCID-4mns-yhyu-9kfq",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82149",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82162",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82183",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8218",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82206",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82213",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82232",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82225",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82219",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82255",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82256",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82277",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82289",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82294",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26714"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2021-26714"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mns-yhyu-9kfq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42496?format=api",
            "vulnerability_id": "VCID-55vv-7jsj-xqeh",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-49294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94971",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94973",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94976",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94985",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94988",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94993",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94995",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94997",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95006",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9501",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95013",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.17085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95012",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-49294"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059032",
                    "reference_id": "1059032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059032"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2023-49294"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55vv-7jsj-xqeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42485?format=api",
            "vulnerability_id": "VCID-6rhm-xrwe-x7af",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61969",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62001",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6197",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6202",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62036",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62057",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62046",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62025",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62067",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62073",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62055",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62052",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62069",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62062",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26717"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983157",
                    "reference_id": "983157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983157"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2021-26717"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6rhm-xrwe-x7af"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42489?format=api",
            "vulnerability_id": "VCID-7kus-4n4f-myd1",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53919",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61596",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61567",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61615",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61629",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61639",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61619",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61661",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61666",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61651",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00414",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61644",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68302",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00558",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68306",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2022-26498"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7kus-4n4f-myd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42490?format=api",
            "vulnerability_id": "VCID-8pdp-epea-juhj",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58287",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6541",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65463",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65474",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65493",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65451",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65489",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.655",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65484",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65501",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71112",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00657",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71117",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2022-26499"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8pdp-epea-juhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42494?format=api",
            "vulnerability_id": "VCID-b4z5-5hbq-5ka8",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74306",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74262",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74272",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74264",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74298",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74307",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74181",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74208",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74214",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74228",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7425",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74231",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74224",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"
                },
                {
                    "reference_url": "https://downloads.asterisk.org/pub/security/AST-2022-009.html",
                    "reference_id": "AST-2022-009.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/"
                        }
                    ],
                    "url": "https://downloads.asterisk.org/pub/security/AST-2022-009.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5358",
                    "reference_id": "dsa-5358",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5358"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html",
                    "reference_id": "msg00029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2022-42706"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4z5-5hbq-5ka8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42497?format=api",
            "vulnerability_id": "VCID-bk8r-brkr-bqc6",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-49786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26846",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26886",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26672",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2674",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26791",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26794",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26749",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26693",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.267",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26631",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26575",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26567",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26494",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-49786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059033",
                    "reference_id": "1059033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059033"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Dec/24",
                    "reference_id": "24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Dec/24"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/12/15/7",
                    "reference_id": "7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/12/15/7"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html",
                    "reference_id": "Asterisk-20.1.0-Denial-Of-Service.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05",
                    "reference_id": "d7d7764cb07c8a1872804321302ef93bf62cba05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05"
                },
                {
                    "reference_url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race",
                    "reference_id": "ES2023-01-asterisk-dtls-hello-race",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"
                        }
                    ],
                    "url": "https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race"
                },
                {
                    "reference_url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq",
                    "reference_id": "GHSA-hxj9-xwr8-w8pq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"
                        }
                    ],
                    "url": "https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html",
                    "reference_id": "msg00019.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2023-49786"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bk8r-brkr-bqc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42495?format=api",
            "vulnerability_id": "VCID-bknu-abgc-bugw",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22375",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22208",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2229",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22345",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22365",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22324",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22265",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22269",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22263",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22215",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22065",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22053",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22039",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37457"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059303",
                    "reference_id": "1059303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059303"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2023-37457"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bknu-abgc-bugw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42492?format=api",
            "vulnerability_id": "VCID-cupt-538a-z3fp",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71669",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71624",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71629",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7161",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7166",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71664",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71549",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71567",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7154",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7158",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7159",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71613",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71598",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71579",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"
                },
                {
                    "reference_url": "https://downloads.asterisk.org/pub/security/AST-2022-007.html",
                    "reference_id": "AST-2022-007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/"
                        }
                    ],
                    "url": "https://downloads.asterisk.org/pub/security/AST-2022-007.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5358",
                    "reference_id": "dsa-5358",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5358"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html",
                    "reference_id": "msg00029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2022-37325"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cupt-538a-z3fp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42486?format=api",
            "vulnerability_id": "VCID-fjzf-5rtw-rqfj",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26906",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74212",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74217",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74232",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74253",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74235",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74227",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74265",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74275",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74267",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74302",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74311",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7431",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26906"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26906",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26906"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983159",
                    "reference_id": "983159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983159"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2021-26906"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjzf-5rtw-rqfj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42483?format=api",
            "vulnerability_id": "VCID-ge7t-fqyp-vyhz",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43675",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43731",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43756",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43689",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43743",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4373",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43775",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43767",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43699",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43636",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4364",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43557",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26713"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2021-26713"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ge7t-fqyp-vyhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42488?format=api",
            "vulnerability_id": "VCID-h193-vjhb-j3a3",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86214",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86241",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86242",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86261",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86271",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86286",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86283",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86279",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86296",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86294",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86312",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86322",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991710",
                    "reference_id": "991710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991710"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2021-32558"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h193-vjhb-j3a3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42481?format=api",
            "vulnerability_id": "VCID-r8b9-jcqa-xyb2",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24665",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24781",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24553",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24625",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24671",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24645",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24589",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24602",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24592",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24569",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24513",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24499",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00085",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24458",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35776"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983158",
                    "reference_id": "983158",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983158"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2020-35776"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8b9-jcqa-xyb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42482?format=api",
            "vulnerability_id": "VCID-xr4a-tmxe-8fcd",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87107",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87117",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87134",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87147",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87168",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87163",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87158",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87174",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87179",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87192",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0327",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87198",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26712"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2021-26712"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xr4a-tmxe-8fcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42491?format=api",
            "vulnerability_id": "VCID-z3fq-m317-ckb8",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62891",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62921",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62885",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62936",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62952",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6297",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62958",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00436",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62977",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6831",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68313",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71727",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71709",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71758",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26651"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2022-26651"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3fq-m317-ckb8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42493?format=api",
            "vulnerability_id": "VCID-zabf-adce-sqde",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81589",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8155",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81551",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81553",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81575",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81584",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8146",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81482",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81479",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81507",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81533",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01567",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8152",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"
                },
                {
                    "reference_url": "https://downloads.asterisk.org/pub/security/AST-2022-008.html",
                    "reference_id": "AST-2022-008.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/"
                        }
                    ],
                    "url": "https://downloads.asterisk.org/pub/security/AST-2022-008.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5358",
                    "reference_id": "dsa-5358",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5358"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html",
                    "reference_id": "msg00029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2022-42705"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zabf-adce-sqde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42487?format=api",
            "vulnerability_id": "VCID-zv1p-p8tb-dqhm",
            "summary": "Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40898",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40926",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40854",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40904",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4091",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40927",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40892",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40873",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40915",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40884",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40805",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40712",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40699",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40617",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31878"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-03",
                    "reference_id": "GLSA-202412-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76073?format=api",
                    "purl": "pkg:ebuild/net-misc/asterisk@18.24.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
                }
            ],
            "aliases": [
                "CVE-2021-31878"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zv1p-p8tb-dqhm"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/asterisk@18.24.3"
}