Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/trafficserver@7.0.0-1?distro=sid |
| Type | deb |
| Namespace | debian |
| Name | trafficserver |
| Version | 7.0.0-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 7.1.2+ds-1 |
| Latest_non_vulnerable_version | 9.2.5+ds-0+deb12u4 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-8aev-nmwa-fkcg |
| vulnerability_id |
VCID-8aev-nmwa-fkcg |
| summary |
A carefully crafted invalid TLS handshake can cause Apache Traffic Server (ATS) to segfault. This affects version 6.2.2. To resolve this issue users running 6.2.2 should upgrade to 6.2.3 or later versions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-8022 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90763 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90769 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.9078 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90791 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90802 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90817 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90834 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90832 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.06136 |
| scoring_system |
epss |
| scoring_elements |
0.90831 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-8022 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-8022
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8aev-nmwa-fkcg |
|
| 1 |
| url |
VCID-m8p8-5n65-qyhy |
| vulnerability_id |
VCID-m8p8-5n65-qyhy |
| summary |
Apache Traffic Server 6.0.0 to 6.2.0 are affected by an HPACK Bomb Attack. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5396 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82855 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82852 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82749 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82765 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82779 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82776 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82802 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82824 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82819 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01806 |
| scoring_system |
epss |
| scoring_elements |
0.82853 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5396 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5396
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m8p8-5n65-qyhy |
|
| 2 |
| url |
VCID-scpg-5hcj-5yd3 |
| vulnerability_id |
VCID-scpg-5hcj-5yd3 |
| summary |
Apache Traffic Server before 6.2.1 generates a coredump when there is a mismatch between content length and chunked encoding. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5659 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83583 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83581 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.8348 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83493 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83507 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83508 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83532 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83542 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83556 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83551 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.83546 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01972 |
| scoring_system |
epss |
| scoring_elements |
0.8358 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-5659 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-5659
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-scpg-5hcj-5yd3 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@7.0.0-1%3Fdistro=sid |