Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-61q8-wyrp-rycg
SummaryImproper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0.
Aliases
0
alias CVE-2021-41585
Fixed_packages
0
url pkg:deb/debian/trafficserver@0?distro=sid
purl pkg:deb/debian/trafficserver@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@0%3Fdistro=sid
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-kjah-am9e-xkev
7
vulnerability VCID-tevw-8dcp-yfh6
8
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1%3Fdistro=sid
2
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3%3Fdistro=sid
3
url pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-jabw-thzt-63bb
7
vulnerability VCID-kjah-am9e-xkev
8
vulnerability VCID-rcdg-j23x-xfbn
9
vulnerability VCID-tevw-8dcp-yfh6
10
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-1%3Fdistro=sid
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-41585
reference_id
reference_type
scores
0
value 0.01034
scoring_system epss
scoring_elements 0.77311
published_at 2026-04-01T12:55:00Z
1
value 0.01034
scoring_system epss
scoring_elements 0.77317
published_at 2026-04-02T12:55:00Z
2
value 0.01034
scoring_system epss
scoring_elements 0.77346
published_at 2026-04-04T12:55:00Z
3
value 0.01034
scoring_system epss
scoring_elements 0.77326
published_at 2026-04-07T12:55:00Z
4
value 0.01034
scoring_system epss
scoring_elements 0.77357
published_at 2026-04-08T12:55:00Z
5
value 0.01034
scoring_system epss
scoring_elements 0.77366
published_at 2026-04-09T12:55:00Z
6
value 0.01034
scoring_system epss
scoring_elements 0.77393
published_at 2026-04-11T12:55:00Z
7
value 0.01034
scoring_system epss
scoring_elements 0.77372
published_at 2026-04-12T12:55:00Z
8
value 0.01034
scoring_system epss
scoring_elements 0.77369
published_at 2026-04-13T12:55:00Z
9
value 0.01034
scoring_system epss
scoring_elements 0.77409
published_at 2026-04-16T12:55:00Z
10
value 0.01034
scoring_system epss
scoring_elements 0.77408
published_at 2026-04-18T12:55:00Z
11
value 0.01034
scoring_system epss
scoring_elements 0.774
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-41585
Weaknesses
Exploits
Severity_range_scorenull
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-61q8-wyrp-rycg