Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/trafficserver@7.0.0-1?distro=sid
Typedeb
Namespacedebian
Nametrafficserver
Version7.0.0-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.1.2+ds-1
Latest_non_vulnerable_version9.2.5+ds-0+deb12u4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-8aev-nmwa-fkcg
vulnerability_id VCID-8aev-nmwa-fkcg
summary A carefully crafted invalid TLS handshake can cause Apache Traffic Server (ATS) to segfault. This affects version 6.2.2. To resolve this issue users running 6.2.2 should upgrade to 6.2.3 or later versions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8022
reference_id
reference_type
scores
0
value 0.06136
scoring_system epss
scoring_elements 0.90763
published_at 2026-04-01T12:55:00Z
1
value 0.06136
scoring_system epss
scoring_elements 0.90769
published_at 2026-04-02T12:55:00Z
2
value 0.06136
scoring_system epss
scoring_elements 0.9078
published_at 2026-04-04T12:55:00Z
3
value 0.06136
scoring_system epss
scoring_elements 0.90791
published_at 2026-04-07T12:55:00Z
4
value 0.06136
scoring_system epss
scoring_elements 0.90802
published_at 2026-04-08T12:55:00Z
5
value 0.06136
scoring_system epss
scoring_elements 0.90808
published_at 2026-04-09T12:55:00Z
6
value 0.06136
scoring_system epss
scoring_elements 0.90817
published_at 2026-04-12T12:55:00Z
7
value 0.06136
scoring_system epss
scoring_elements 0.90815
published_at 2026-04-13T12:55:00Z
8
value 0.06136
scoring_system epss
scoring_elements 0.90834
published_at 2026-04-16T12:55:00Z
9
value 0.06136
scoring_system epss
scoring_elements 0.90832
published_at 2026-04-18T12:55:00Z
10
value 0.06136
scoring_system epss
scoring_elements 0.90831
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8022
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8022
fixed_packages
0
url pkg:deb/debian/trafficserver@7.0.0-1?distro=sid
purl pkg:deb/debian/trafficserver@7.0.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@7.0.0-1%3Fdistro=sid
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-kjah-am9e-xkev
7
vulnerability VCID-tevw-8dcp-yfh6
8
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3%3Fdistro=sid
3
url pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-jabw-thzt-63bb
7
vulnerability VCID-kjah-am9e-xkev
8
vulnerability VCID-rcdg-j23x-xfbn
9
vulnerability VCID-tevw-8dcp-yfh6
10
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-1%3Fdistro=sid
aliases CVE-2018-8022
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8aev-nmwa-fkcg
1
url VCID-m8p8-5n65-qyhy
vulnerability_id VCID-m8p8-5n65-qyhy
summary Apache Traffic Server 6.0.0 to 6.2.0 are affected by an HPACK Bomb Attack.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5396
reference_id
reference_type
scores
0
value 0.01806
scoring_system epss
scoring_elements 0.82855
published_at 2026-04-21T12:55:00Z
1
value 0.01806
scoring_system epss
scoring_elements 0.82852
published_at 2026-04-18T12:55:00Z
2
value 0.01806
scoring_system epss
scoring_elements 0.82749
published_at 2026-04-01T12:55:00Z
3
value 0.01806
scoring_system epss
scoring_elements 0.82765
published_at 2026-04-02T12:55:00Z
4
value 0.01806
scoring_system epss
scoring_elements 0.82779
published_at 2026-04-04T12:55:00Z
5
value 0.01806
scoring_system epss
scoring_elements 0.82776
published_at 2026-04-07T12:55:00Z
6
value 0.01806
scoring_system epss
scoring_elements 0.82802
published_at 2026-04-08T12:55:00Z
7
value 0.01806
scoring_system epss
scoring_elements 0.82808
published_at 2026-04-09T12:55:00Z
8
value 0.01806
scoring_system epss
scoring_elements 0.82824
published_at 2026-04-11T12:55:00Z
9
value 0.01806
scoring_system epss
scoring_elements 0.82819
published_at 2026-04-12T12:55:00Z
10
value 0.01806
scoring_system epss
scoring_elements 0.82815
published_at 2026-04-13T12:55:00Z
11
value 0.01806
scoring_system epss
scoring_elements 0.82853
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5396
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5396
2
reference_url https://issues.apache.org/jira/browse/TS-5019
reference_id
reference_type
scores
url https://issues.apache.org/jira/browse/TS-5019
3
reference_url http://www.securityfocus.com/bid/97945
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97945
4
reference_url http://www.securitytracker.com/id/1038275
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038275
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:6.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.1.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:6.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.1.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:6.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:6.2.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5396
reference_id CVE-2016-5396
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5396
fixed_packages
0
url pkg:deb/debian/trafficserver@7.0.0-1?distro=sid
purl pkg:deb/debian/trafficserver@7.0.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@7.0.0-1%3Fdistro=sid
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-kjah-am9e-xkev
7
vulnerability VCID-tevw-8dcp-yfh6
8
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3%3Fdistro=sid
3
url pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-jabw-thzt-63bb
7
vulnerability VCID-kjah-am9e-xkev
8
vulnerability VCID-rcdg-j23x-xfbn
9
vulnerability VCID-tevw-8dcp-yfh6
10
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-1%3Fdistro=sid
aliases CVE-2016-5396
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8p8-5n65-qyhy
2
url VCID-scpg-5hcj-5yd3
vulnerability_id VCID-scpg-5hcj-5yd3
summary Apache Traffic Server before 6.2.1 generates a coredump when there is a mismatch between content length and chunked encoding.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5659
reference_id
reference_type
scores
0
value 0.01972
scoring_system epss
scoring_elements 0.83583
published_at 2026-04-21T12:55:00Z
1
value 0.01972
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-18T12:55:00Z
2
value 0.01972
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-01T12:55:00Z
3
value 0.01972
scoring_system epss
scoring_elements 0.83493
published_at 2026-04-02T12:55:00Z
4
value 0.01972
scoring_system epss
scoring_elements 0.83507
published_at 2026-04-04T12:55:00Z
5
value 0.01972
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-07T12:55:00Z
6
value 0.01972
scoring_system epss
scoring_elements 0.83532
published_at 2026-04-08T12:55:00Z
7
value 0.01972
scoring_system epss
scoring_elements 0.83542
published_at 2026-04-09T12:55:00Z
8
value 0.01972
scoring_system epss
scoring_elements 0.83556
published_at 2026-04-11T12:55:00Z
9
value 0.01972
scoring_system epss
scoring_elements 0.83551
published_at 2026-04-12T12:55:00Z
10
value 0.01972
scoring_system epss
scoring_elements 0.83546
published_at 2026-04-13T12:55:00Z
11
value 0.01972
scoring_system epss
scoring_elements 0.8358
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5659
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5659
2
reference_url https://issues.apache.org/jira/browse/TS-4819
reference_id
reference_type
scores
url https://issues.apache.org/jira/browse/TS-4819
3
reference_url http://www.securityfocus.com/bid/97949
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97949
4
reference_url http://www.securitytracker.com/id/1038275
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038275
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5659
reference_id CVE-2017-5659
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5659
fixed_packages
0
url pkg:deb/debian/trafficserver@7.0.0-1?distro=sid
purl pkg:deb/debian/trafficserver@7.0.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@7.0.0-1%3Fdistro=sid
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-kjah-am9e-xkev
7
vulnerability VCID-tevw-8dcp-yfh6
8
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3%3Fdistro=sid
3
url pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-jabw-thzt-63bb
7
vulnerability VCID-kjah-am9e-xkev
8
vulnerability VCID-rcdg-j23x-xfbn
9
vulnerability VCID-tevw-8dcp-yfh6
10
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-1%3Fdistro=sid
aliases CVE-2017-5659
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-scpg-5hcj-5yd3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@7.0.0-1%3Fdistro=sid