Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/undertow@2.2.16-1?distro=sid
Typedeb
Namespacedebian
Nameundertow
Version2.2.16-1
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.2.17-1
Latest_non_vulnerable_version2.3.20-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cf5j-2dz8-7bbu
vulnerability_id VCID-cf5j-2dz8-7bbu
summary
Undertow vulnerable to Denial of Service (DoS) attacks
Undertow client side invocation timeout raised when calling over HTTP2, this vulnerability can allow attacker to carry out denial of service (DoS) attacks in versions less than 2.2.15 Final.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3859.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3859.json
1
reference_url https://access.redhat.com/security/cve/cve-2021-3859
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/cve-2021-3859
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3859
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.54115
published_at 2026-04-13T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.54135
published_at 2026-04-12T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54154
published_at 2026-04-16T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54104
published_at 2026-04-09T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54106
published_at 2026-04-08T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.54054
published_at 2026-04-07T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54138
published_at 2026-04-21T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54157
published_at 2026-04-18T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.5408
published_at 2026-04-04T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54051
published_at 2026-04-02T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54034
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3859
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2010378
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=2010378
4
reference_url https://github.com/undertow-io/undertow
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/undertow-io/undertow
5
reference_url https://github.com/undertow-io/undertow/commit/db0f5be43f8e2a4b88fbedd2eb6d5a95a29ceaa8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/undertow-io/undertow/commit/db0f5be43f8e2a4b88fbedd2eb6d5a95a29ceaa8
6
reference_url https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2
7
reference_url https://github.com/undertow-io/undertow/pull/1296
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/undertow-io/undertow/pull/1296
8
reference_url https://issues.redhat.com/browse/UNDERTOW-1979
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/UNDERTOW-1979
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3859
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-3859
10
reference_url https://security.netapp.com/advisory/ntap-20221201-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20221201-0004
11
reference_url https://security.netapp.com/advisory/ntap-20221201-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20221201-0004/
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015983
reference_id 1015983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015983
13
reference_url https://access.redhat.com/security/cve/CVE-2021-3859
reference_id CVE-2021-3859
reference_type
scores
url https://access.redhat.com/security/cve/CVE-2021-3859
14
reference_url https://github.com/advisories/GHSA-339q-62wm-c39w
reference_id GHSA-339q-62wm-c39w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-339q-62wm-c39w
15
reference_url https://access.redhat.com/errata/RHSA-2022:0400
reference_id RHSA-2022:0400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0400
16
reference_url https://access.redhat.com/errata/RHSA-2022:0401
reference_id RHSA-2022:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0401
17
reference_url https://access.redhat.com/errata/RHSA-2022:0404
reference_id RHSA-2022:0404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0404
18
reference_url https://access.redhat.com/errata/RHSA-2022:0405
reference_id RHSA-2022:0405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0405
19
reference_url https://access.redhat.com/errata/RHSA-2022:0406
reference_id RHSA-2022:0406
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0406
20
reference_url https://access.redhat.com/errata/RHSA-2022:0407
reference_id RHSA-2022:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0407
21
reference_url https://access.redhat.com/errata/RHSA-2022:0408
reference_id RHSA-2022:0408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0408
22
reference_url https://access.redhat.com/errata/RHSA-2022:0409
reference_id RHSA-2022:0409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0409
23
reference_url https://access.redhat.com/errata/RHSA-2022:0410
reference_id RHSA-2022:0410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0410
24
reference_url https://access.redhat.com/errata/RHSA-2022:0415
reference_id RHSA-2022:0415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0415
25
reference_url https://access.redhat.com/errata/RHSA-2022:0447
reference_id RHSA-2022:0447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0447
26
reference_url https://access.redhat.com/errata/RHSA-2022:0448
reference_id RHSA-2022:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0448
27
reference_url https://access.redhat.com/errata/RHSA-2022:1179
reference_id RHSA-2022:1179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1179
28
reference_url https://access.redhat.com/errata/RHSA-2022:5532
reference_id RHSA-2022:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5532
fixed_packages
0
url pkg:deb/debian/undertow@2.2.16-1?distro=sid
purl pkg:deb/debian/undertow@2.2.16-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/undertow@2.2.16-1%3Fdistro=sid
1
url pkg:deb/debian/undertow@2.3.20-1?distro=sid
purl pkg:deb/debian/undertow@2.3.20-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/undertow@2.3.20-1%3Fdistro=sid
aliases CVE-2021-3859, GHSA-339q-62wm-c39w, GMS-2022-2963
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cf5j-2dz8-7bbu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/undertow@2.2.16-1%3Fdistro=sid