| 0 |
| url |
VCID-4738-xk8n-hbac |
| vulnerability_id |
VCID-4738-xk8n-hbac |
| summary |
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-38311 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24039 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23867 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23881 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23825 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24026 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24008 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00274 |
| scoring_system |
epss |
| scoring_elements |
0.5085 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00745 |
| scoring_system |
epss |
| scoring_elements |
0.7305 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00745 |
| scoring_system |
epss |
| scoring_elements |
0.73 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00745 |
| scoring_system |
epss |
| scoring_elements |
0.7302 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00745 |
| scoring_system |
epss |
| scoring_elements |
0.72996 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00745 |
| scoring_system |
epss |
| scoring_elements |
0.73033 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00745 |
| scoring_system |
epss |
| scoring_elements |
0.73047 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00745 |
| scoring_system |
epss |
| scoring_elements |
0.73071 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-38311 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-38311
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4738-xk8n-hbac |
|
| 1 |
| url |
VCID-4hs3-be7k-9qe7 |
| vulnerability_id |
VCID-4hs3-be7k-9qe7 |
| summary |
Apache Traffic Server allows request smuggling if chunked messages are malformed.
This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1.
Users are recommended to upgrade to version 9.2.13 or 10.1.2, which fix the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-65114 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08219 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00163 |
| scoring_system |
epss |
| scoring_elements |
0.37207 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0021 |
| scoring_system |
epss |
| scoring_elements |
0.4329 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.0021 |
| scoring_system |
epss |
| scoring_elements |
0.43358 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0021 |
| scoring_system |
epss |
| scoring_elements |
0.43288 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.0021 |
| scoring_system |
epss |
| scoring_elements |
0.43424 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0021 |
| scoring_system |
epss |
| scoring_elements |
0.43212 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43984 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43999 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44002 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.43969 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00215 |
| scoring_system |
epss |
| scoring_elements |
0.44031 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-65114 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-65114
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4hs3-be7k-9qe7 |
|
| 2 |
| url |
VCID-4uhe-mtbx-nfdu |
| vulnerability_id |
VCID-4uhe-mtbx-nfdu |
| summary |
Improper Access Control vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-56195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.1771 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17746 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17768 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21969 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21964 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22397 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39335 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00645 |
| scoring_system |
epss |
| scoring_elements |
0.70696 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00645 |
| scoring_system |
epss |
| scoring_elements |
0.70632 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00645 |
| scoring_system |
epss |
| scoring_elements |
0.70651 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00645 |
| scoring_system |
epss |
| scoring_elements |
0.70628 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00645 |
| scoring_system |
epss |
| scoring_elements |
0.70674 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00645 |
| scoring_system |
epss |
| scoring_elements |
0.7069 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00645 |
| scoring_system |
epss |
| scoring_elements |
0.70712 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-56195 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-56195
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4uhe-mtbx-nfdu |
|
| 3 |
| url |
VCID-5e1r-3jec-tkhp |
| vulnerability_id |
VCID-5e1r-3jec-tkhp |
| summary |
trafficserver: Traffic Server ESI Inclusion Depth Vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-49763 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69415 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69399 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.7018 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70094 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.7014 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70156 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70165 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0212 |
| scoring_system |
epss |
| scoring_elements |
0.8416 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.03368 |
| scoring_system |
epss |
| scoring_elements |
0.87399 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.03368 |
| scoring_system |
epss |
| scoring_elements |
0.87398 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.03368 |
| scoring_system |
epss |
| scoring_elements |
0.87375 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.03368 |
| scoring_system |
epss |
| scoring_elements |
0.87391 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.03368 |
| scoring_system |
epss |
| scoring_elements |
0.8738 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-49763 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-49763
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5e1r-3jec-tkhp |
|
| 4 |
| url |
VCID-c62p-6ghw-j3dv |
| vulnerability_id |
VCID-c62p-6ghw-j3dv |
| summary |
Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50305 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54808 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54812 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54832 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54804 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54827 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54796 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54847 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54844 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54856 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54816 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54854 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00318 |
| scoring_system |
epss |
| scoring_elements |
0.54837 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50305 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-50305
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c62p-6ghw-j3dv |
|
| 5 |
| url |
VCID-eay7-63um-43e9 |
| vulnerability_id |
VCID-eay7-63um-43e9 |
| summary |
Apache Traffic Server allows request smuggling if chunked messages are malformed. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-53868 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82748 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82732 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82742 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82618 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82632 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82628 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82654 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82679 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82673 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82669 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82706 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.82707 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.01774 |
| scoring_system |
epss |
| scoring_elements |
0.8271 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-53868 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-53868
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eay7-63um-43e9 |
|
| 6 |
| url |
VCID-esap-nkps-cfg9 |
| vulnerability_id |
VCID-esap-nkps-cfg9 |
| summary |
Invalid Accept-Encoding header can cause Apache Traffic Server to fail cache lookup and force forwarding requests. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-35296 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31025 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31228 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31104 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31553 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31595 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31464 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31494 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31499 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31457 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31419 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31453 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31432 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31401 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-35296 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-35296
|
| risk_score |
3.7 |
| exploitability |
0.5 |
| weighted_severity |
7.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-esap-nkps-cfg9 |
|
| 7 |
| url |
VCID-jabw-thzt-63bb |
| vulnerability_id |
VCID-jabw-thzt-63bb |
| summary |
Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50306 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74462 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74456 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74464 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74372 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74379 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74394 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74415 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74395 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74387 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74424 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74433 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.0082 |
| scoring_system |
epss |
| scoring_elements |
0.74422 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-50306 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-50306
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jabw-thzt-63bb |
|
| 8 |
| url |
VCID-jb1b-9gr2-suez |
| vulnerability_id |
VCID-jb1b-9gr2-suez |
| summary |
Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users can set a new setting (proxy.config.http.drop_chunked_trailers) not to forward chunked trailer section. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-35161 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44089 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56591 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.5659 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56608 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56654 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56633 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56684 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56672 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56651 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56682 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56681 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00338 |
| scoring_system |
epss |
| scoring_elements |
0.56653 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-35161 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-35161
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jb1b-9gr2-suez |
|
| 9 |
| url |
VCID-kjah-am9e-xkev |
| vulnerability_id |
VCID-kjah-am9e-xkev |
| summary |
Expected Behavior Violation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-56202 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34493 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34047 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34066 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.33961 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34478 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00142 |
| scoring_system |
epss |
| scoring_elements |
0.34438 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00168 |
| scoring_system |
epss |
| scoring_elements |
0.37948 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54589 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54556 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5458 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54549 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.546 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54595 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54607 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-56202 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-56202
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kjah-am9e-xkev |
|
| 10 |
| url |
VCID-rcdg-j23x-xfbn |
| vulnerability_id |
VCID-rcdg-j23x-xfbn |
| summary |
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-38479 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68816 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68804 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.6881 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.6868 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.687 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68677 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68728 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68746 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68769 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68755 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68726 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68767 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68778 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00574 |
| scoring_system |
epss |
| scoring_elements |
0.68756 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-38479 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-38479
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rcdg-j23x-xfbn |
|
| 11 |
| url |
VCID-rw58-bnwt-2bam |
| vulnerability_id |
VCID-rw58-bnwt-2bam |
| summary |
Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38522 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58478 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58465 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58458 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58477 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58448 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58501 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58507 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58524 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58504 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58485 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58517 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58521 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.585 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38522 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38522
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rw58-bnwt-2bam |
|
| 12 |
| url |
VCID-tevw-8dcp-yfh6 |
| vulnerability_id |
VCID-tevw-8dcp-yfh6 |
| summary |
trafficserver: Apache Traffic Server PROXY Protocol ACL Bypass |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-31698 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43155 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44157 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44088 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44139 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44141 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44124 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00743 |
| scoring_system |
epss |
| scoring_elements |
0.73056 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00753 |
| scoring_system |
epss |
| scoring_elements |
0.73271 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00753 |
| scoring_system |
epss |
| scoring_elements |
0.73282 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00753 |
| scoring_system |
epss |
| scoring_elements |
0.73243 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00753 |
| scoring_system |
epss |
| scoring_elements |
0.73284 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00753 |
| scoring_system |
epss |
| scoring_elements |
0.73237 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-31698 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-31698
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tevw-8dcp-yfh6 |
|
| 13 |
| url |
VCID-ww3t-p3pq-gkhy |
| vulnerability_id |
VCID-ww3t-p3pq-gkhy |
| summary |
A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue. A workaround for older versions is to set proxy.config.http.request_buffer_enabled to 0 (the default value is 0). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58136 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12268 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00183 |
| scoring_system |
epss |
| scoring_elements |
0.4001 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47341 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47338 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47362 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47336 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47343 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00241 |
| scoring_system |
epss |
| scoring_elements |
0.47402 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52677 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52628 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52638 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52601 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58136 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-58136
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ww3t-p3pq-gkhy |
|