Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wget@1.21-1%2Bdeb11u1
Typedeb
Namespacedebian
Namewget
Version1.21-1+deb11u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.25.0-2
Latest_non_vulnerable_version1.25.0-2
Affected_by_vulnerabilities
0
url VCID-q53y-6aup-17gk
vulnerability_id VCID-q53y-6aup-17gk
summary wget: GNU Wget is vulnerable to an SSRF attack when accessing partially-user-controlled shorthand URLs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10524.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10524
reference_id
reference_type
scores
0
value 0.00436
scoring_system epss
scoring_elements 0.6298
published_at 2026-04-04T12:55:00Z
1
value 0.00436
scoring_system epss
scoring_elements 0.62951
published_at 2026-04-02T12:55:00Z
2
value 0.00436
scoring_system epss
scoring_elements 0.62945
published_at 2026-04-07T12:55:00Z
3
value 0.00436
scoring_system epss
scoring_elements 0.62996
published_at 2026-04-08T12:55:00Z
4
value 0.00436
scoring_system epss
scoring_elements 0.63012
published_at 2026-04-09T12:55:00Z
5
value 0.00592
scoring_system epss
scoring_elements 0.69257
published_at 2026-04-12T12:55:00Z
6
value 0.00592
scoring_system epss
scoring_elements 0.69256
published_at 2026-04-21T12:55:00Z
7
value 0.00592
scoring_system epss
scoring_elements 0.69229
published_at 2026-04-13T12:55:00Z
8
value 0.00592
scoring_system epss
scoring_elements 0.69272
published_at 2026-04-11T12:55:00Z
9
value 0.00592
scoring_system epss
scoring_elements 0.69267
published_at 2026-04-16T12:55:00Z
10
value 0.00592
scoring_system epss
scoring_elements 0.69276
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://seclists.org/oss-sec/2024/q4/107
reference_id 107
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:19:46Z/
url https://seclists.org/oss-sec/2024/q4/107
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088023
reference_id 1088023
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088023
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327303
reference_id 2327303
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327303
7
reference_url https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/
reference_id cve-2024-10524-wget-zero-day-vulnerability
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:19:46Z/
url https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/
8
reference_url https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778
reference_id ?id=c419542d956a2607bbce5df64b9d378a8588d778
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:19:46Z/
url https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778
fixed_packages
0
url pkg:deb/debian/wget@1.25.0-2
purl pkg:deb/debian/wget@1.25.0-2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.25.0-2
aliases CVE-2024-10524
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q53y-6aup-17gk
1
url VCID-yyf4-yz4z-rugu
vulnerability_id VCID-yyf4-yz4z-rugu
summary wget: Misinterpretation of input may lead to improper behavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38428.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38428.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38428
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41617
published_at 2026-04-21T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41694
published_at 2026-04-09T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41717
published_at 2026-04-16T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41685
published_at 2026-04-12T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.4167
published_at 2026-04-13T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41691
published_at 2026-04-18T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41681
published_at 2026-04-02T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41709
published_at 2026-04-04T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41636
published_at 2026-04-07T12:55:00Z
9
value 0.00197
scoring_system epss
scoring_elements 0.41686
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38428
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073523
reference_id 1073523
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073523
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292836
reference_id 2292836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292836
6
reference_url https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace
reference_id ?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:48:27Z/
url https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace
7
reference_url https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:48:27Z/
url https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html
8
reference_url https://access.redhat.com/errata/RHSA-2024:4998
reference_id RHSA-2024:4998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4998
9
reference_url https://access.redhat.com/errata/RHSA-2024:5299
reference_id RHSA-2024:5299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5299
10
reference_url https://access.redhat.com/errata/RHSA-2024:6192
reference_id RHSA-2024:6192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6192
11
reference_url https://access.redhat.com/errata/RHSA-2024:6208
reference_id RHSA-2024:6208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6208
12
reference_url https://access.redhat.com/errata/RHSA-2024:6438
reference_id RHSA-2024:6438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6438
13
reference_url https://usn.ubuntu.com/6852-1/
reference_id USN-6852-1
reference_type
scores
url https://usn.ubuntu.com/6852-1/
14
reference_url https://usn.ubuntu.com/6852-2/
reference_id USN-6852-2
reference_type
scores
url https://usn.ubuntu.com/6852-2/
fixed_packages
0
url pkg:deb/debian/wget@1.21.3-1%2Bdeb12u1
purl pkg:deb/debian/wget@1.21.3-1%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-q53y-6aup-17gk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.21.3-1%252Bdeb12u1
aliases CVE-2024-38428
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yyf4-yz4z-rugu
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.21-1%252Bdeb11u1