Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/asterisk@20.8.1-r0?arch=loongarch64&distroversion=edge&reponame=main
Typeapk
Namespacealpine
Nameasterisk
Version20.8.1-r0
Qualifiers
arch loongarch64
distroversion edge
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version20.9.2-r0
Latest_non_vulnerable_version20.11.1-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1t3u-22gq-qucr
vulnerability_id VCID-1t3u-22gq-qucr
summary Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35190
reference_id
reference_type
scores
0
value 0.00332
scoring_system epss
scoring_elements 0.56115
published_at 2026-04-16T12:55:00Z
1
value 0.00332
scoring_system epss
scoring_elements 0.56054
published_at 2026-04-02T12:55:00Z
2
value 0.00332
scoring_system epss
scoring_elements 0.56074
published_at 2026-04-04T12:55:00Z
3
value 0.00332
scoring_system epss
scoring_elements 0.56053
published_at 2026-04-07T12:55:00Z
4
value 0.00332
scoring_system epss
scoring_elements 0.56104
published_at 2026-04-08T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.56109
published_at 2026-04-09T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.5612
published_at 2026-04-11T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.56097
published_at 2026-04-12T12:55:00Z
8
value 0.00332
scoring_system epss
scoring_elements 0.5608
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35190
1
reference_url https://github.com/asterisk/asterisk/pull/600
reference_id 600
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-17T19:33:53Z/
url https://github.com/asterisk/asterisk/pull/600
2
reference_url https://github.com/asterisk/asterisk/pull/602
reference_id 602
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-17T19:33:53Z/
url https://github.com/asterisk/asterisk/pull/602
3
reference_url https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d
reference_id 85241bd22936cc15760fd1f65d16c98be7aeaf6d
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-17T19:33:53Z/
url https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d
4
reference_url https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9
reference_id GHSA-qqxj-v78h-hrf9
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-17T19:33:53Z/
url https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9
fixed_packages
0
url pkg:apk/alpine/asterisk@20.8.1-r0?arch=loongarch64&distroversion=edge&reponame=main
purl pkg:apk/alpine/asterisk@20.8.1-r0?arch=loongarch64&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/asterisk@20.8.1-r0%3Farch=loongarch64&distroversion=edge&reponame=main
aliases CVE-2024-35190
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1t3u-22gq-qucr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/asterisk@20.8.1-r0%3Farch=loongarch64&distroversion=edge&reponame=main