Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
Typedeb
Namespacedebian
Nametrafficserver
Version8.0.2+ds-1+deb10u6
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version9.2.5+ds-0+deb12u3
Latest_non_vulnerable_version9.2.5+ds-0+deb12u3
Affected_by_vulnerabilities
0
url VCID-41x7-hv4u-byb9
vulnerability_id VCID-41x7-hv4u-byb9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32749
reference_id
reference_type
scores
0
value 0.00921
scoring_system epss
scoring_elements 0.75912
published_at 2026-04-02T12:55:00Z
1
value 0.00921
scoring_system epss
scoring_elements 0.75944
published_at 2026-04-04T12:55:00Z
2
value 0.01339
scoring_system epss
scoring_elements 0.80008
published_at 2026-04-09T12:55:00Z
3
value 0.01339
scoring_system epss
scoring_elements 0.80028
published_at 2026-04-11T12:55:00Z
4
value 0.01339
scoring_system epss
scoring_elements 0.79971
published_at 2026-04-07T12:55:00Z
5
value 0.01339
scoring_system epss
scoring_elements 0.79999
published_at 2026-04-08T12:55:00Z
6
value 0.06551
scoring_system epss
scoring_elements 0.91232
published_at 2026-05-14T12:55:00Z
7
value 0.06551
scoring_system epss
scoring_elements 0.91211
published_at 2026-05-11T12:55:00Z
8
value 0.06551
scoring_system epss
scoring_elements 0.9122
published_at 2026-05-12T12:55:00Z
9
value 0.06551
scoring_system epss
scoring_elements 0.91137
published_at 2026-04-12T12:55:00Z
10
value 0.06551
scoring_system epss
scoring_elements 0.91136
published_at 2026-04-13T12:55:00Z
11
value 0.06551
scoring_system epss
scoring_elements 0.91161
published_at 2026-04-18T12:55:00Z
12
value 0.06551
scoring_system epss
scoring_elements 0.91164
published_at 2026-04-21T12:55:00Z
13
value 0.06551
scoring_system epss
scoring_elements 0.91178
published_at 2026-04-24T12:55:00Z
14
value 0.06551
scoring_system epss
scoring_elements 0.91175
published_at 2026-04-26T12:55:00Z
15
value 0.06551
scoring_system epss
scoring_elements 0.91171
published_at 2026-04-29T12:55:00Z
16
value 0.06551
scoring_system epss
scoring_elements 0.91184
published_at 2026-05-05T12:55:00Z
17
value 0.06551
scoring_system epss
scoring_elements 0.91201
published_at 2026-05-07T12:55:00Z
18
value 0.06551
scoring_system epss
scoring_elements 0.91212
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32749
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392
3
reference_url https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
reference_id mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-17T14:20:46Z/
url https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-32749
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-41x7-hv4u-byb9
1
url VCID-4men-293s-3bhn
vulnerability_id VCID-4men-293s-3bhn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33934
reference_id
reference_type
scores
0
value 0.00299
scoring_system epss
scoring_elements 0.5319
published_at 2026-04-02T12:55:00Z
1
value 0.00299
scoring_system epss
scoring_elements 0.53214
published_at 2026-04-04T12:55:00Z
2
value 0.00299
scoring_system epss
scoring_elements 0.53182
published_at 2026-04-07T12:55:00Z
3
value 0.00299
scoring_system epss
scoring_elements 0.53235
published_at 2026-04-08T12:55:00Z
4
value 0.00299
scoring_system epss
scoring_elements 0.53229
published_at 2026-04-09T12:55:00Z
5
value 0.00299
scoring_system epss
scoring_elements 0.5328
published_at 2026-04-11T12:55:00Z
6
value 0.00299
scoring_system epss
scoring_elements 0.53266
published_at 2026-04-12T12:55:00Z
7
value 0.00299
scoring_system epss
scoring_elements 0.53248
published_at 2026-04-13T12:55:00Z
8
value 0.00299
scoring_system epss
scoring_elements 0.53286
published_at 2026-04-16T12:55:00Z
9
value 0.004
scoring_system epss
scoring_elements 0.60754
published_at 2026-04-26T12:55:00Z
10
value 0.004
scoring_system epss
scoring_elements 0.60746
published_at 2026-04-29T12:55:00Z
11
value 0.004
scoring_system epss
scoring_elements 0.60768
published_at 2026-04-18T12:55:00Z
12
value 0.004
scoring_system epss
scoring_elements 0.60753
published_at 2026-04-21T12:55:00Z
13
value 0.004
scoring_system epss
scoring_elements 0.60741
published_at 2026-04-24T12:55:00Z
14
value 0.00456
scoring_system epss
scoring_elements 0.63985
published_at 2026-05-11T12:55:00Z
15
value 0.00456
scoring_system epss
scoring_elements 0.64012
published_at 2026-05-12T12:55:00Z
16
value 0.00456
scoring_system epss
scoring_elements 0.64063
published_at 2026-05-14T12:55:00Z
17
value 0.00456
scoring_system epss
scoring_elements 0.63927
published_at 2026-05-05T12:55:00Z
18
value 0.00456
scoring_system epss
scoring_elements 0.63972
published_at 2026-05-07T12:55:00Z
19
value 0.00456
scoring_system epss
scoring_elements 0.64018
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33934
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430
reference_id 1043430
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/
reference_id BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/
6
reference_url https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
reference_id jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/
url https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
7
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-33934
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4men-293s-3bhn
2
url VCID-4wwn-74ac-p7dp
vulnerability_id VCID-4wwn-74ac-p7dp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37150
reference_id
reference_type
scores
0
value 0.01159
scoring_system epss
scoring_elements 0.78765
published_at 2026-05-14T12:55:00Z
1
value 0.01159
scoring_system epss
scoring_elements 0.78536
published_at 2026-04-02T12:55:00Z
2
value 0.01159
scoring_system epss
scoring_elements 0.78602
published_at 2026-04-21T12:55:00Z
3
value 0.01159
scoring_system epss
scoring_elements 0.78634
published_at 2026-04-24T12:55:00Z
4
value 0.01159
scoring_system epss
scoring_elements 0.78641
published_at 2026-04-26T12:55:00Z
5
value 0.01159
scoring_system epss
scoring_elements 0.78658
published_at 2026-04-29T12:55:00Z
6
value 0.01159
scoring_system epss
scoring_elements 0.78674
published_at 2026-05-05T12:55:00Z
7
value 0.01159
scoring_system epss
scoring_elements 0.78698
published_at 2026-05-07T12:55:00Z
8
value 0.01159
scoring_system epss
scoring_elements 0.78714
published_at 2026-05-09T12:55:00Z
9
value 0.01159
scoring_system epss
scoring_elements 0.7871
published_at 2026-05-11T12:55:00Z
10
value 0.01159
scoring_system epss
scoring_elements 0.78726
published_at 2026-05-12T12:55:00Z
11
value 0.01159
scoring_system epss
scoring_elements 0.7853
published_at 2026-04-01T12:55:00Z
12
value 0.01159
scoring_system epss
scoring_elements 0.78566
published_at 2026-04-04T12:55:00Z
13
value 0.01159
scoring_system epss
scoring_elements 0.78549
published_at 2026-04-07T12:55:00Z
14
value 0.01159
scoring_system epss
scoring_elements 0.78575
published_at 2026-04-08T12:55:00Z
15
value 0.01159
scoring_system epss
scoring_elements 0.78581
published_at 2026-04-09T12:55:00Z
16
value 0.01159
scoring_system epss
scoring_elements 0.78605
published_at 2026-04-18T12:55:00Z
17
value 0.01159
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-12T12:55:00Z
18
value 0.01159
scoring_system epss
scoring_elements 0.78578
published_at 2026-04-13T12:55:00Z
19
value 0.01159
scoring_system epss
scoring_elements 0.78607
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37150
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
reference_id CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
8
reference_url https://www.debian.org/security/2022/dsa-5206
reference_id dsa-5206
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://www.debian.org/security/2022/dsa-5206
9
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html
10
reference_url https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
reference_id rc64lwbdgrkv674koc3zl1sljr9vwg21
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
reference_id ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37150
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wwn-74ac-p7dp
3
url VCID-568b-s8ks-vfa6
vulnerability_id VCID-568b-s8ks-vfa6
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17565
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.79153
published_at 2026-05-14T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.79117
published_at 2026-05-12T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78928
published_at 2026-04-01T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-02T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78961
published_at 2026-04-04T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-07T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.7897
published_at 2026-04-08T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-09T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-21T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78984
published_at 2026-04-12T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-13T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.79002
published_at 2026-04-16T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.79029
published_at 2026-04-24T12:55:00Z
13
value 0.01208
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-26T12:55:00Z
14
value 0.01208
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-29T12:55:00Z
15
value 0.01208
scoring_system epss
scoring_elements 0.79067
published_at 2026-05-05T12:55:00Z
16
value 0.01208
scoring_system epss
scoring_elements 0.79087
published_at 2026-05-07T12:55:00Z
17
value 0.01208
scoring_system epss
scoring_elements 0.79104
published_at 2026-05-09T12:55:00Z
18
value 0.01208
scoring_system epss
scoring_elements 0.79101
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17565
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17565
reference_id CVE-2019-17565
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17565
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-17565
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-568b-s8ks-vfa6
4
url VCID-5781-s1ny-q7ey
vulnerability_id VCID-5781-s1ny-q7ey
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44487.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44487.json
1
reference_url https://akka.io/security/akka-http-cve-2023-44487.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://akka.io/security/akka-http-cve-2023-44487.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-44487
reference_id
reference_type
scores
0
value 0.94385
scoring_system epss
scoring_elements 0.9997
published_at 2026-04-04T12:55:00Z
1
value 0.94385
scoring_system epss
scoring_elements 0.99971
published_at 2026-04-13T12:55:00Z
2
value 0.94395
scoring_system epss
scoring_elements 0.99974
published_at 2026-04-18T12:55:00Z
3
value 0.944
scoring_system epss
scoring_elements 0.99976
published_at 2026-05-14T12:55:00Z
4
value 0.94445
scoring_system epss
scoring_elements 0.99991
published_at 2026-05-11T12:55:00Z
5
value 0.94446
scoring_system epss
scoring_elements 0.99992
published_at 2026-05-07T12:55:00Z
6
value 0.9446
scoring_system epss
scoring_elements 0.99994
published_at 2026-05-05T12:55:00Z
7
value 0.9446
scoring_system epss
scoring_elements 0.99993
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-44487
3
reference_url https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size
4
reference_url https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/
5
reference_url https://aws.amazon.com/security/security-bulletins/AWS-2023-011
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://aws.amazon.com/security/security-bulletins/AWS-2023-011
6
reference_url https://aws.amazon.com/security/security-bulletins/AWS-2023-011/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://aws.amazon.com/security/security-bulletins/AWS-2023-011/
7
reference_url https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack
8
reference_url https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/
9
reference_url https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack
10
reference_url https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/
11
reference_url https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty
12
reference_url https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/
13
reference_url https://bugzilla.proxmox.com/show_bug.cgi?id=4988
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://bugzilla.proxmox.com/show_bug.cgi?id=4988
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2242803
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2242803
15
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1216123
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1216123
16
reference_url https://cert-portal.siemens.com/productcert/html/ssa-082556.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/html/ssa-082556.html
17
reference_url https://cert-portal.siemens.com/productcert/html/ssa-341067.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/html/ssa-341067.html
18
reference_url https://cert-portal.siemens.com/productcert/html/ssa-832273.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/html/ssa-832273.html
19
reference_url https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9
20
reference_url https://chaos.social/@icing/111210915918780532
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://chaos.social/@icing/111210915918780532
21
reference_url https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps
22
reference_url https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/
23
reference_url https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
24
reference_url https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34462
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36478
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
30
reference_url https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715
31
reference_url https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve
32
reference_url https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088
35
reference_url https://github.com/akka/akka-http/issues/4323
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/akka/akka-http/issues/4323
36
reference_url https://github.com/akka/akka-http/pull/4324
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/akka/akka-http/pull/4324
37
reference_url https://github.com/akka/akka-http/pull/4325
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/akka/akka-http/pull/4325
38
reference_url https://github.com/alibaba/tengine/issues/1872
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/alibaba/tengine/issues/1872
39
reference_url https://github.com/apache/apisix/issues/10320
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/apisix/issues/10320
40
reference_url https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113
41
reference_url https://github.com/apache/httpd-site/pull/10
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/httpd-site/pull/10
42
reference_url https://github.com/apache/tomcat/commit/6d1a9fd6642387969e4410b9989c85856b74917a
reference_id
reference_type
scores
url https://github.com/apache/tomcat/commit/6d1a9fd6642387969e4410b9989c85856b74917a
43
reference_url https://github.com/apache/tomcat/commit/76bb4bfbfeae827dce896f650655bbf6e251ed49
reference_id
reference_type
scores
url https://github.com/apache/tomcat/commit/76bb4bfbfeae827dce896f650655bbf6e251ed49
44
reference_url https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628
45
reference_url https://github.com/apache/tomcat/commit/9cdfe25bad707f34b3e5da2994f3f1952a163c3e
reference_id
reference_type
scores
url https://github.com/apache/tomcat/commit/9cdfe25bad707f34b3e5da2994f3f1952a163c3e
46
reference_url https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2
47
reference_url https://github.com/apache/trafficserver/pull/10564
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/apache/trafficserver/pull/10564
48
reference_url https://github.com/apple/swift-nio-http2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apple/swift-nio-http2
49
reference_url https://github.com/Azure/AKS/issues/3947
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/Azure/AKS/issues/3947
50
reference_url https://github.com/caddyserver/caddy/issues/5877
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/caddyserver/caddy/issues/5877
51
reference_url https://github.com/caddyserver/caddy/releases/tag/v2.7.5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/caddyserver/caddy/releases/tag/v2.7.5
52
reference_url https://github.com/dotnet/announcements/issues/277
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/dotnet/announcements/issues/277
53
reference_url https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73
54
reference_url https://github.com/eclipse/jetty.project/issues/10679
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/eclipse/jetty.project/issues/10679
55
reference_url https://github.com/envoyproxy/envoy/pull/30055
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/envoyproxy/envoy/pull/30055
56
reference_url https://github.com/etcd-io/etcd/issues/16740
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/etcd-io/etcd/issues/16740
57
reference_url https://github.com/facebook/proxygen/pull/466
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/facebook/proxygen/pull/466
58
reference_url https://github.com/golang/go/issues/63417
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/golang/go/issues/63417
59
reference_url https://github.com/grpc/grpc-go/pull/6703
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/grpc/grpc-go/pull/6703
60
reference_url https://github.com/grpc/grpc-go/releases
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/grpc/grpc-go/releases
61
reference_url https://github.com/grpc/grpc/releases/tag/v1.59.2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/grpc/grpc/releases/tag/v1.59.2
62
reference_url https://github.com/h2o/h2o/pull/3291
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/h2o/h2o/pull/3291
63
reference_url https://github.com/haproxy/haproxy/issues/2312
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/haproxy/haproxy/issues/2312
64
reference_url https://github.com/hyperium/hyper/issues/3337
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/hyperium/hyper/issues/3337
65
reference_url https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244
66
reference_url https://github.com/junkurihara/rust-rpxy/issues/97
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/junkurihara/rust-rpxy/issues/97
67
reference_url https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1
68
reference_url https://github.com/kazu-yamamoto/http2/issues/93
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/kazu-yamamoto/http2/issues/93
69
reference_url https://github.com/Kong/kong/discussions/11741
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/Kong/kong/discussions/11741
70
reference_url https://github.com/kubernetes/kubernetes/pull/121120
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/kubernetes/kubernetes/pull/121120
71
reference_url https://github.com/line/armeria/pull/5232
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/line/armeria/pull/5232
72
reference_url https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632
73
reference_url https://github.com/micrictor/http2-rst-stream
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/micrictor/http2-rst-stream
74
reference_url https://github.com/microsoft/CBL-Mariner/pull/6381
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/microsoft/CBL-Mariner/pull/6381
75
reference_url https://github.com/netty/netty
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/netty/netty
76
reference_url https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
77
reference_url https://github.com/nghttp2/nghttp2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nghttp2/nghttp2
78
reference_url https://github.com/nghttp2/nghttp2/commit/72b4af6143681f528f1d237b21a9a7aee1738832
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nghttp2/nghttp2/commit/72b4af6143681f528f1d237b21a9a7aee1738832
79
reference_url https://github.com/nghttp2/nghttp2/pull/1961
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/nghttp2/nghttp2/pull/1961
80
reference_url https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0
81
reference_url https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg
82
reference_url https://github.com/ninenines/cowboy/issues/1615
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/ninenines/cowboy/issues/1615
83
reference_url https://github.com/nodejs/node/pull/50121
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/nodejs/node/pull/50121
84
reference_url https://github.com/openresty/openresty/issues/930
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/openresty/openresty/issues/930
85
reference_url https://github.com/opensearch-project/data-prepper/issues/3474
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/opensearch-project/data-prepper/issues/3474
86
reference_url https://github.com/oqtane/oqtane.framework/discussions/3367
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/oqtane/oqtane.framework/discussions/3367
87
reference_url https://github.com/projectcontour/contour/pull/5826
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/projectcontour/contour/pull/5826
88
reference_url https://github.com/tempesta-tech/tempesta/issues/1986
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/tempesta-tech/tempesta/issues/1986
89
reference_url https://github.com/varnishcache/varnish-cache/issues/3996
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/varnishcache/varnish-cache/issues/3996
90
reference_url https://go.dev/cl/534215
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/534215
91
reference_url https://go.dev/cl/534235
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/534235
92
reference_url https://go.dev/issue/63417
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/63417
93
reference_url https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo
94
reference_url https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ
95
reference_url https://istio.io/latest/news/security/istio-security-2023-004
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://istio.io/latest/news/security/istio-security-2023-004
96
reference_url https://istio.io/latest/news/security/istio-security-2023-004/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://istio.io/latest/news/security/istio-security-2023-004/
97
reference_url https://linkerd.io/2023/10/12/linkerd-cve-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://linkerd.io/2023/10/12/linkerd-cve-2023-44487
98
reference_url https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/
99
reference_url https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
100
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
101
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html
102
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html
103
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html
104
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html
105
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html
106
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html
107
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
108
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
109
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
110
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
111
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
112
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
113
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
114
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
115
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
116
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
117
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
118
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
119
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
120
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
121
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ
122
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
123
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY
124
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
125
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
126
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
127
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
128
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
129
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
130
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
131
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
132
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
133
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
134
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
135
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
136
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
137
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
138
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
139
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
140
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
141
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
142
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
143
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
144
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
145
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3
146
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
147
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
148
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
149
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
150
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
151
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
152
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
153
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5
154
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
155
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
156
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ
157
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/
158
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY
159
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/
160
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
161
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
162
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
163
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
164
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
165
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
166
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
167
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
168
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
169
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
170
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3
171
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/
172
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
173
reference_url https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html
174
reference_url https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html
175
reference_url https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html
176
reference_url https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2
177
reference_url https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/
178
reference_url https://my.f5.com/manage/s/article/K000137106
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://my.f5.com/manage/s/article/K000137106
179
reference_url https://netty.io/news/2023/10/10/4-1-100-Final.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://netty.io/news/2023/10/10/4-1-100-Final.html
180
reference_url https://news.ycombinator.com/item?id=37830987
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://news.ycombinator.com/item?id=37830987
181
reference_url https://news.ycombinator.com/item?id=37830998
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://news.ycombinator.com/item?id=37830998
182
reference_url https://news.ycombinator.com/item?id=37831062
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://news.ycombinator.com/item?id=37831062
183
reference_url https://news.ycombinator.com/item?id=37837043
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://news.ycombinator.com/item?id=37837043
184
reference_url https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response
185
reference_url https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/
186
reference_url https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected
187
reference_url https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ
188
reference_url https://security.gentoo.org/glsa/202311-09
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.gentoo.org/glsa/202311-09
189
reference_url https://security.netapp.com/advisory/ntap-20231016-0001
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231016-0001
190
reference_url https://security.netapp.com/advisory/ntap-20231016-0001/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.netapp.com/advisory/ntap-20231016-0001/
191
reference_url https://security.netapp.com/advisory/ntap-20240426-0007
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240426-0007
192
reference_url https://security.netapp.com/advisory/ntap-20240621-0006
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0006
193
reference_url https://security.netapp.com/advisory/ntap-20240621-0007
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0007
194
reference_url https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14
195
reference_url https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12
196
reference_url https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94
197
reference_url https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81
198
reference_url https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records
199
reference_url https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/
200
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487
201
reference_url https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487
202
reference_url https://www.cve.org/CVERecord?id=CVE-2023-44487
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.cve.org/CVERecord?id=CVE-2023-44487
203
reference_url https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
204
reference_url https://www.debian.org/security/2023/dsa-5521
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5521
205
reference_url https://www.debian.org/security/2023/dsa-5522
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5522
206
reference_url https://www.debian.org/security/2023/dsa-5540
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5540
207
reference_url https://www.debian.org/security/2023/dsa-5549
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5549
208
reference_url https://www.debian.org/security/2023/dsa-5558
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5558
209
reference_url https://www.debian.org/security/2023/dsa-5570
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.debian.org/security/2023/dsa-5570
210
reference_url https://www.eclipse.org/lists/jetty-announce/msg00181.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.eclipse.org/lists/jetty-announce/msg00181.html
211
reference_url https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
212
reference_url https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487
213
reference_url https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/
214
reference_url https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products
215
reference_url https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/
216
reference_url https://www.openwall.com/lists/oss-security/2023/10/10/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.openwall.com/lists/oss-security/2023/10/10/6
217
reference_url https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack
218
reference_url https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday
219
reference_url https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/
220
reference_url https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause
221
reference_url http://www.openwall.com/lists/oss-security/2023/10/10/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/10/6
222
reference_url http://www.openwall.com/lists/oss-security/2023/10/10/7
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/10/7
223
reference_url http://www.openwall.com/lists/oss-security/2023/10/13/4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/13/4
224
reference_url http://www.openwall.com/lists/oss-security/2023/10/13/9
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/13/9
225
reference_url http://www.openwall.com/lists/oss-security/2023/10/18/4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/18/4
226
reference_url http://www.openwall.com/lists/oss-security/2023/10/18/8
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/18/8
227
reference_url http://www.openwall.com/lists/oss-security/2023/10/19/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/19/6
228
reference_url http://www.openwall.com/lists/oss-security/2023/10/20/8
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url http://www.openwall.com/lists/oss-security/2023/10/20/8
229
reference_url http://www.openwall.com/lists/oss-security/2025/08/13/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/08/13/6
230
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053769
reference_id 1053769
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053769
231
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053770
reference_id 1053770
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053770
232
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053801
reference_id 1053801
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053801
233
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054232
reference_id 1054232
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054232
234
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054234
reference_id 1054234
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054234
235
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056156
reference_id 1056156
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056156
236
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074421
reference_id 1074421
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074421
237
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
reference_id 2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/
238
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
reference_id 3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/
239
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
reference_id BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/
240
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
reference_id CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
241
reference_url https://access.redhat.com/security/cve/cve-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://access.redhat.com/security/cve/cve-2023-44487
242
reference_url https://blog.vespa.ai/cve-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://blog.vespa.ai/cve-2023-44487
243
reference_url https://blog.vespa.ai/cve-2023-44487/
reference_id CVE-2023-44487
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.vespa.ai/cve-2023-44487/
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value Important
scoring_system apache_tomcat
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487
245
reference_url https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487
246
reference_url https://github.com/bcdannyboy/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/bcdannyboy/CVE-2023-44487
247
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52426.py
reference_id CVE-2023-44487
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52426.py
248
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487
249
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-44487
250
reference_url https://security.paloaltonetworks.com/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.paloaltonetworks.com/CVE-2023-44487
251
reference_url https://ubuntu.com/security/CVE-2023-44487
reference_id CVE-2023-44487
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://ubuntu.com/security/CVE-2023-44487
252
reference_url https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack
reference_id CVE-2023-44487-HTTP-2-RAPID-RESET-ATTACK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack
253
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
reference_id E72T67UPDRXHIDLO3OROR25YAMN4GGW5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/
254
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
reference_id FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/
255
reference_url https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf
reference_id GHSA-2m7v-gc89-fjqf
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf
256
reference_url https://github.com/advisories/GHSA-qppj-fm5r-hxr3
reference_id GHSA-qppj-fm5r-hxr3
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/advisories/GHSA-qppj-fm5r-hxr3
257
reference_url https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3
reference_id GHSA-qppj-fm5r-hxr3
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
4
value HIGH
scoring_system generic_textual
scoring_elements
5
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3
258
reference_url https://github.com/advisories/GHSA-vx74-f528-fxqg
reference_id GHSA-vx74-f528-fxqg
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/advisories/GHSA-vx74-f528-fxqg
259
reference_url https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
reference_id GHSA-xpw8-rcwv-8f8p
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A
4
value MODERATE
scoring_system generic_textual
scoring_elements
5
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
260
reference_url https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p
reference_id GHSA-xpw8-rcwv-8f8p
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p
261
reference_url https://security.gentoo.org/glsa/202408-10
reference_id GLSA-202408-10
reference_type
scores
url https://security.gentoo.org/glsa/202408-10
262
reference_url https://security.gentoo.org/glsa/202412-14
reference_id GLSA-202412-14
reference_type
scores
url https://security.gentoo.org/glsa/202412-14
263
reference_url https://security.gentoo.org/glsa/202505-11
reference_id GLSA-202505-11
reference_type
scores
url https://security.gentoo.org/glsa/202505-11
264
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
reference_id HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/
265
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
reference_id KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
266
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
reference_id LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/
267
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
reference_id LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/
268
reference_url https://security.netapp.com/advisory/ntap-20240426-0007/
reference_id ntap-20240426-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.netapp.com/advisory/ntap-20240426-0007/
269
reference_url https://security.netapp.com/advisory/ntap-20240621-0007/
reference_id ntap-20240621-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://security.netapp.com/advisory/ntap-20240621-0007/
270
reference_url https://access.redhat.com/errata/RHSA-2023:5006
reference_id RHSA-2023:5006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5006
271
reference_url https://access.redhat.com/errata/RHSA-2023:5009
reference_id RHSA-2023:5009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5009
272
reference_url https://access.redhat.com/errata/RHSA-2023:5530
reference_id RHSA-2023:5530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5530
273
reference_url https://access.redhat.com/errata/RHSA-2023:5541
reference_id RHSA-2023:5541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5541
274
reference_url https://access.redhat.com/errata/RHSA-2023:5542
reference_id RHSA-2023:5542
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5542
275
reference_url https://access.redhat.com/errata/RHSA-2023:5679
reference_id RHSA-2023:5679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5679
276
reference_url https://access.redhat.com/errata/RHSA-2023:5705
reference_id RHSA-2023:5705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5705
277
reference_url https://access.redhat.com/errata/RHSA-2023:5706
reference_id RHSA-2023:5706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5706
278
reference_url https://access.redhat.com/errata/RHSA-2023:5707
reference_id RHSA-2023:5707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5707
279
reference_url https://access.redhat.com/errata/RHSA-2023:5708
reference_id RHSA-2023:5708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5708
280
reference_url https://access.redhat.com/errata/RHSA-2023:5709
reference_id RHSA-2023:5709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5709
281
reference_url https://access.redhat.com/errata/RHSA-2023:5710
reference_id RHSA-2023:5710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5710
282
reference_url https://access.redhat.com/errata/RHSA-2023:5711
reference_id RHSA-2023:5711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5711
283
reference_url https://access.redhat.com/errata/RHSA-2023:5712
reference_id RHSA-2023:5712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5712
284
reference_url https://access.redhat.com/errata/RHSA-2023:5713
reference_id RHSA-2023:5713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5713
285
reference_url https://access.redhat.com/errata/RHSA-2023:5714
reference_id RHSA-2023:5714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5714
286
reference_url https://access.redhat.com/errata/RHSA-2023:5715
reference_id RHSA-2023:5715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5715
287
reference_url https://access.redhat.com/errata/RHSA-2023:5716
reference_id RHSA-2023:5716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5716
288
reference_url https://access.redhat.com/errata/RHSA-2023:5717
reference_id RHSA-2023:5717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5717
289
reference_url https://access.redhat.com/errata/RHSA-2023:5719
reference_id RHSA-2023:5719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5719
290
reference_url https://access.redhat.com/errata/RHSA-2023:5720
reference_id RHSA-2023:5720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5720
291
reference_url https://access.redhat.com/errata/RHSA-2023:5721
reference_id RHSA-2023:5721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5721
292
reference_url https://access.redhat.com/errata/RHSA-2023:5724
reference_id RHSA-2023:5724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5724
293
reference_url https://access.redhat.com/errata/RHSA-2023:5738
reference_id RHSA-2023:5738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5738
294
reference_url https://access.redhat.com/errata/RHSA-2023:5749
reference_id RHSA-2023:5749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5749
295
reference_url https://access.redhat.com/errata/RHSA-2023:5764
reference_id RHSA-2023:5764
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5764
296
reference_url https://access.redhat.com/errata/RHSA-2023:5765
reference_id RHSA-2023:5765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5765
297
reference_url https://access.redhat.com/errata/RHSA-2023:5766
reference_id RHSA-2023:5766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5766
298
reference_url https://access.redhat.com/errata/RHSA-2023:5767
reference_id RHSA-2023:5767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5767
299
reference_url https://access.redhat.com/errata/RHSA-2023:5768
reference_id RHSA-2023:5768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5768
300
reference_url https://access.redhat.com/errata/RHSA-2023:5769
reference_id RHSA-2023:5769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5769
301
reference_url https://access.redhat.com/errata/RHSA-2023:5770
reference_id RHSA-2023:5770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5770
302
reference_url https://access.redhat.com/errata/RHSA-2023:5780
reference_id RHSA-2023:5780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5780
303
reference_url https://access.redhat.com/errata/RHSA-2023:5783
reference_id RHSA-2023:5783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5783
304
reference_url https://access.redhat.com/errata/RHSA-2023:5784
reference_id RHSA-2023:5784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5784
305
reference_url https://access.redhat.com/errata/RHSA-2023:5801
reference_id RHSA-2023:5801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5801
306
reference_url https://access.redhat.com/errata/RHSA-2023:5802
reference_id RHSA-2023:5802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5802
307
reference_url https://access.redhat.com/errata/RHSA-2023:5803
reference_id RHSA-2023:5803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5803
308
reference_url https://access.redhat.com/errata/RHSA-2023:5805
reference_id RHSA-2023:5805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5805
309
reference_url https://access.redhat.com/errata/RHSA-2023:5835
reference_id RHSA-2023:5835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5835
310
reference_url https://access.redhat.com/errata/RHSA-2023:5837
reference_id RHSA-2023:5837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5837
311
reference_url https://access.redhat.com/errata/RHSA-2023:5838
reference_id RHSA-2023:5838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5838
312
reference_url https://access.redhat.com/errata/RHSA-2023:5840
reference_id RHSA-2023:5840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5840
313
reference_url https://access.redhat.com/errata/RHSA-2023:5841
reference_id RHSA-2023:5841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5841
314
reference_url https://access.redhat.com/errata/RHSA-2023:5849
reference_id RHSA-2023:5849
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5849
315
reference_url https://access.redhat.com/errata/RHSA-2023:5850
reference_id RHSA-2023:5850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5850
316
reference_url https://access.redhat.com/errata/RHSA-2023:5851
reference_id RHSA-2023:5851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5851
317
reference_url https://access.redhat.com/errata/RHSA-2023:5863
reference_id RHSA-2023:5863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5863
318
reference_url https://access.redhat.com/errata/RHSA-2023:5864
reference_id RHSA-2023:5864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5864
319
reference_url https://access.redhat.com/errata/RHSA-2023:5865
reference_id RHSA-2023:5865
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5865
320
reference_url https://access.redhat.com/errata/RHSA-2023:5866
reference_id RHSA-2023:5866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5866
321
reference_url https://access.redhat.com/errata/RHSA-2023:5867
reference_id RHSA-2023:5867
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5867
322
reference_url https://access.redhat.com/errata/RHSA-2023:5869
reference_id RHSA-2023:5869
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5869
323
reference_url https://access.redhat.com/errata/RHSA-2023:5896
reference_id RHSA-2023:5896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5896
324
reference_url https://access.redhat.com/errata/RHSA-2023:5902
reference_id RHSA-2023:5902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5902
325
reference_url https://access.redhat.com/errata/RHSA-2023:5920
reference_id RHSA-2023:5920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5920
326
reference_url https://access.redhat.com/errata/RHSA-2023:5922
reference_id RHSA-2023:5922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5922
327
reference_url https://access.redhat.com/errata/RHSA-2023:5924
reference_id RHSA-2023:5924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5924
328
reference_url https://access.redhat.com/errata/RHSA-2023:5928
reference_id RHSA-2023:5928
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5928
329
reference_url https://access.redhat.com/errata/RHSA-2023:5929
reference_id RHSA-2023:5929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5929
330
reference_url https://access.redhat.com/errata/RHSA-2023:5930
reference_id RHSA-2023:5930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5930
331
reference_url https://access.redhat.com/errata/RHSA-2023:5931
reference_id RHSA-2023:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5931
332
reference_url https://access.redhat.com/errata/RHSA-2023:5933
reference_id RHSA-2023:5933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5933
333
reference_url https://access.redhat.com/errata/RHSA-2023:5935
reference_id RHSA-2023:5935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5935
334
reference_url https://access.redhat.com/errata/RHSA-2023:5945
reference_id RHSA-2023:5945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5945
335
reference_url https://access.redhat.com/errata/RHSA-2023:5946
reference_id RHSA-2023:5946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5946
336
reference_url https://access.redhat.com/errata/RHSA-2023:5947
reference_id RHSA-2023:5947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5947
337
reference_url https://access.redhat.com/errata/RHSA-2023:5956
reference_id RHSA-2023:5956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5956
338
reference_url https://access.redhat.com/errata/RHSA-2023:5964
reference_id RHSA-2023:5964
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5964
339
reference_url https://access.redhat.com/errata/RHSA-2023:5965
reference_id RHSA-2023:5965
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5965
340
reference_url https://access.redhat.com/errata/RHSA-2023:5967
reference_id RHSA-2023:5967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5967
341
reference_url https://access.redhat.com/errata/RHSA-2023:5969
reference_id RHSA-2023:5969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5969
342
reference_url https://access.redhat.com/errata/RHSA-2023:5970
reference_id RHSA-2023:5970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5970
343
reference_url https://access.redhat.com/errata/RHSA-2023:5971
reference_id RHSA-2023:5971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5971
344
reference_url https://access.redhat.com/errata/RHSA-2023:5973
reference_id RHSA-2023:5973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5973
345
reference_url https://access.redhat.com/errata/RHSA-2023:5974
reference_id RHSA-2023:5974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5974
346
reference_url https://access.redhat.com/errata/RHSA-2023:5976
reference_id RHSA-2023:5976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5976
347
reference_url https://access.redhat.com/errata/RHSA-2023:5978
reference_id RHSA-2023:5978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5978
348
reference_url https://access.redhat.com/errata/RHSA-2023:5979
reference_id RHSA-2023:5979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5979
349
reference_url https://access.redhat.com/errata/RHSA-2023:5980
reference_id RHSA-2023:5980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5980
350
reference_url https://access.redhat.com/errata/RHSA-2023:5982
reference_id RHSA-2023:5982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5982
351
reference_url https://access.redhat.com/errata/RHSA-2023:5989
reference_id RHSA-2023:5989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5989
352
reference_url https://access.redhat.com/errata/RHSA-2023:6020
reference_id RHSA-2023:6020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6020
353
reference_url https://access.redhat.com/errata/RHSA-2023:6021
reference_id RHSA-2023:6021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6021
354
reference_url https://access.redhat.com/errata/RHSA-2023:6022
reference_id RHSA-2023:6022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6022
355
reference_url https://access.redhat.com/errata/RHSA-2023:6023
reference_id RHSA-2023:6023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6023
356
reference_url https://access.redhat.com/errata/RHSA-2023:6030
reference_id RHSA-2023:6030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6030
357
reference_url https://access.redhat.com/errata/RHSA-2023:6031
reference_id RHSA-2023:6031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6031
358
reference_url https://access.redhat.com/errata/RHSA-2023:6039
reference_id RHSA-2023:6039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6039
359
reference_url https://access.redhat.com/errata/RHSA-2023:6040
reference_id RHSA-2023:6040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6040
360
reference_url https://access.redhat.com/errata/RHSA-2023:6041
reference_id RHSA-2023:6041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6041
361
reference_url https://access.redhat.com/errata/RHSA-2023:6042
reference_id RHSA-2023:6042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6042
362
reference_url https://access.redhat.com/errata/RHSA-2023:6048
reference_id RHSA-2023:6048
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6048
363
reference_url https://access.redhat.com/errata/RHSA-2023:6057
reference_id RHSA-2023:6057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6057
364
reference_url https://access.redhat.com/errata/RHSA-2023:6059
reference_id RHSA-2023:6059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6059
365
reference_url https://access.redhat.com/errata/RHSA-2023:6061
reference_id RHSA-2023:6061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6061
366
reference_url https://access.redhat.com/errata/RHSA-2023:6077
reference_id RHSA-2023:6077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6077
367
reference_url https://access.redhat.com/errata/RHSA-2023:6079
reference_id RHSA-2023:6079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6079
368
reference_url https://access.redhat.com/errata/RHSA-2023:6080
reference_id RHSA-2023:6080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6080
369
reference_url https://access.redhat.com/errata/RHSA-2023:6084
reference_id RHSA-2023:6084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6084
370
reference_url https://access.redhat.com/errata/RHSA-2023:6105
reference_id RHSA-2023:6105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6105
371
reference_url https://access.redhat.com/errata/RHSA-2023:6106
reference_id RHSA-2023:6106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6106
372
reference_url https://access.redhat.com/errata/RHSA-2023:6114
reference_id RHSA-2023:6114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6114
373
reference_url https://access.redhat.com/errata/RHSA-2023:6115
reference_id RHSA-2023:6115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6115
374
reference_url https://access.redhat.com/errata/RHSA-2023:6117
reference_id RHSA-2023:6117
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6117
375
reference_url https://access.redhat.com/errata/RHSA-2023:6118
reference_id RHSA-2023:6118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6118
376
reference_url https://access.redhat.com/errata/RHSA-2023:6120
reference_id RHSA-2023:6120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6120
377
reference_url https://access.redhat.com/errata/RHSA-2023:6129
reference_id RHSA-2023:6129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6129
378
reference_url https://access.redhat.com/errata/RHSA-2023:6137
reference_id RHSA-2023:6137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6137
379
reference_url https://access.redhat.com/errata/RHSA-2023:6144
reference_id RHSA-2023:6144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6144
380
reference_url https://access.redhat.com/errata/RHSA-2023:6154
reference_id RHSA-2023:6154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6154
381
reference_url https://access.redhat.com/errata/RHSA-2023:6161
reference_id RHSA-2023:6161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6161
382
reference_url https://access.redhat.com/errata/RHSA-2023:6165
reference_id RHSA-2023:6165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6165
383
reference_url https://access.redhat.com/errata/RHSA-2023:6179
reference_id RHSA-2023:6179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6179
384
reference_url https://access.redhat.com/errata/RHSA-2023:6217
reference_id RHSA-2023:6217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6217
385
reference_url https://access.redhat.com/errata/RHSA-2023:6233
reference_id RHSA-2023:6233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6233
386
reference_url https://access.redhat.com/errata/RHSA-2023:6235
reference_id RHSA-2023:6235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6235
387
reference_url https://access.redhat.com/errata/RHSA-2023:6239
reference_id RHSA-2023:6239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6239
388
reference_url https://access.redhat.com/errata/RHSA-2023:6248
reference_id RHSA-2023:6248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6248
389
reference_url https://access.redhat.com/errata/RHSA-2023:6251
reference_id RHSA-2023:6251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6251
390
reference_url https://access.redhat.com/errata/RHSA-2023:6269
reference_id RHSA-2023:6269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6269
391
reference_url https://access.redhat.com/errata/RHSA-2023:6272
reference_id RHSA-2023:6272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6272
392
reference_url https://access.redhat.com/errata/RHSA-2023:6280
reference_id RHSA-2023:6280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6280
393
reference_url https://access.redhat.com/errata/RHSA-2023:6286
reference_id RHSA-2023:6286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6286
394
reference_url https://access.redhat.com/errata/RHSA-2023:6296
reference_id RHSA-2023:6296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6296
395
reference_url https://access.redhat.com/errata/RHSA-2023:6298
reference_id RHSA-2023:6298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6298
396
reference_url https://access.redhat.com/errata/RHSA-2023:6305
reference_id RHSA-2023:6305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6305
397
reference_url https://access.redhat.com/errata/RHSA-2023:6746
reference_id RHSA-2023:6746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6746
398
reference_url https://access.redhat.com/errata/RHSA-2023:6779
reference_id RHSA-2023:6779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6779
399
reference_url https://access.redhat.com/errata/RHSA-2023:6781
reference_id RHSA-2023:6781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6781
400
reference_url https://access.redhat.com/errata/RHSA-2023:6782
reference_id RHSA-2023:6782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6782
401
reference_url https://access.redhat.com/errata/RHSA-2023:6783
reference_id RHSA-2023:6783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6783
402
reference_url https://access.redhat.com/errata/RHSA-2023:6784
reference_id RHSA-2023:6784
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6784
403
reference_url https://access.redhat.com/errata/RHSA-2023:6785
reference_id RHSA-2023:6785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6785
404
reference_url https://access.redhat.com/errata/RHSA-2023:6786
reference_id RHSA-2023:6786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6786
405
reference_url https://access.redhat.com/errata/RHSA-2023:6787
reference_id RHSA-2023:6787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6787
406
reference_url https://access.redhat.com/errata/RHSA-2023:6788
reference_id RHSA-2023:6788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6788
407
reference_url https://access.redhat.com/errata/RHSA-2023:6817
reference_id RHSA-2023:6817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6817
408
reference_url https://access.redhat.com/errata/RHSA-2023:6818
reference_id RHSA-2023:6818
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6818
409
reference_url https://access.redhat.com/errata/RHSA-2023:6832
reference_id RHSA-2023:6832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6832
410
reference_url https://access.redhat.com/errata/RHSA-2023:6836
reference_id RHSA-2023:6836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6836
411
reference_url https://access.redhat.com/errata/RHSA-2023:6837
reference_id RHSA-2023:6837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6837
412
reference_url https://access.redhat.com/errata/RHSA-2023:6839
reference_id RHSA-2023:6839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6839
413
reference_url https://access.redhat.com/errata/RHSA-2023:6840
reference_id RHSA-2023:6840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6840
414
reference_url https://access.redhat.com/errata/RHSA-2023:7198
reference_id RHSA-2023:7198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7198
415
reference_url https://access.redhat.com/errata/RHSA-2023:7205
reference_id RHSA-2023:7205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7205
416
reference_url https://access.redhat.com/errata/RHSA-2023:7215
reference_id RHSA-2023:7215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7215
417
reference_url https://access.redhat.com/errata/RHSA-2023:7218
reference_id RHSA-2023:7218
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7218
418
reference_url https://access.redhat.com/errata/RHSA-2023:7288
reference_id RHSA-2023:7288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7288
419
reference_url https://access.redhat.com/errata/RHSA-2023:7315
reference_id RHSA-2023:7315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7315
420
reference_url https://access.redhat.com/errata/RHSA-2023:7325
reference_id RHSA-2023:7325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7325
421
reference_url https://access.redhat.com/errata/RHSA-2023:7334
reference_id RHSA-2023:7334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7334
422
reference_url https://access.redhat.com/errata/RHSA-2023:7335
reference_id RHSA-2023:7335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7335
423
reference_url https://access.redhat.com/errata/RHSA-2023:7344
reference_id RHSA-2023:7344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7344
424
reference_url https://access.redhat.com/errata/RHSA-2023:7345
reference_id RHSA-2023:7345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7345
425
reference_url https://access.redhat.com/errata/RHSA-2023:7481
reference_id RHSA-2023:7481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7481
426
reference_url https://access.redhat.com/errata/RHSA-2023:7482
reference_id RHSA-2023:7482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7482
427
reference_url https://access.redhat.com/errata/RHSA-2023:7483
reference_id RHSA-2023:7483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7483
428
reference_url https://access.redhat.com/errata/RHSA-2023:7484
reference_id RHSA-2023:7484
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7484
429
reference_url https://access.redhat.com/errata/RHSA-2023:7486
reference_id RHSA-2023:7486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7486
430
reference_url https://access.redhat.com/errata/RHSA-2023:7488
reference_id RHSA-2023:7488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7488
431
reference_url https://access.redhat.com/errata/RHSA-2023:7521
reference_id RHSA-2023:7521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7521
432
reference_url https://access.redhat.com/errata/RHSA-2023:7522
reference_id RHSA-2023:7522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7522
433
reference_url https://access.redhat.com/errata/RHSA-2023:7555
reference_id RHSA-2023:7555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7555
434
reference_url https://access.redhat.com/errata/RHSA-2023:7587
reference_id RHSA-2023:7587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7587
435
reference_url https://access.redhat.com/errata/RHSA-2023:7610
reference_id RHSA-2023:7610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7610
436
reference_url https://access.redhat.com/errata/RHSA-2023:7682
reference_id RHSA-2023:7682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7682
437
reference_url https://access.redhat.com/errata/RHSA-2023:7687
reference_id RHSA-2023:7687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7687
438
reference_url https://access.redhat.com/errata/RHSA-2023:7699
reference_id RHSA-2023:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7699
439
reference_url https://access.redhat.com/errata/RHSA-2023:7703
reference_id RHSA-2023:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7703
440
reference_url https://access.redhat.com/errata/RHSA-2023:7704
reference_id RHSA-2023:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7704
441
reference_url https://access.redhat.com/errata/RHSA-2023:7741
reference_id RHSA-2023:7741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7741
442
reference_url https://access.redhat.com/errata/RHSA-2024:0269
reference_id RHSA-2024:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0269
443
reference_url https://access.redhat.com/errata/RHSA-2024:0302
reference_id RHSA-2024:0302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0302
444
reference_url https://access.redhat.com/errata/RHSA-2024:0777
reference_id RHSA-2024:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0777
445
reference_url https://access.redhat.com/errata/RHSA-2024:1444
reference_id RHSA-2024:1444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1444
446
reference_url https://access.redhat.com/errata/RHSA-2024:1770
reference_id RHSA-2024:1770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1770
447
reference_url https://access.redhat.com/errata/RHSA-2024:2633
reference_id RHSA-2024:2633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2633
448
reference_url https://access.redhat.com/errata/RHSA-2024:4631
reference_id RHSA-2024:4631
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4631
449
reference_url https://access.redhat.com/errata/RHSA-2025:16668
reference_id RHSA-2025:16668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16668
450
reference_url https://usn.ubuntu.com/6427-1/
reference_id USN-6427-1
reference_type
scores
url https://usn.ubuntu.com/6427-1/
451
reference_url https://usn.ubuntu.com/6427-2/
reference_id USN-6427-2
reference_type
scores
url https://usn.ubuntu.com/6427-2/
452
reference_url https://usn.ubuntu.com/6438-1/
reference_id USN-6438-1
reference_type
scores
url https://usn.ubuntu.com/6438-1/
453
reference_url https://usn.ubuntu.com/6505-1/
reference_id USN-6505-1
reference_type
scores
url https://usn.ubuntu.com/6505-1/
454
reference_url https://usn.ubuntu.com/6574-1/
reference_id USN-6574-1
reference_type
scores
url https://usn.ubuntu.com/6574-1/
455
reference_url https://usn.ubuntu.com/6754-1/
reference_id USN-6754-1
reference_type
scores
url https://usn.ubuntu.com/6754-1/
456
reference_url https://usn.ubuntu.com/6994-1/
reference_id USN-6994-1
reference_type
scores
url https://usn.ubuntu.com/6994-1/
457
reference_url https://usn.ubuntu.com/7067-1/
reference_id USN-7067-1
reference_type
scores
url https://usn.ubuntu.com/7067-1/
458
reference_url https://usn.ubuntu.com/7410-1/
reference_id USN-7410-1
reference_type
scores
url https://usn.ubuntu.com/7410-1/
459
reference_url https://usn.ubuntu.com/7469-1/
reference_id USN-7469-1
reference_type
scores
url https://usn.ubuntu.com/7469-1/
460
reference_url https://usn.ubuntu.com/7469-2/
reference_id USN-7469-2
reference_type
scores
url https://usn.ubuntu.com/7469-2/
461
reference_url https://usn.ubuntu.com/7469-3/
reference_id USN-7469-3
reference_type
scores
url https://usn.ubuntu.com/7469-3/
462
reference_url https://usn.ubuntu.com/7469-4/
reference_id USN-7469-4
reference_type
scores
url https://usn.ubuntu.com/7469-4/
463
reference_url https://usn.ubuntu.com/7892-1/
reference_id USN-7892-1
reference_type
scores
url https://usn.ubuntu.com/7892-1/
464
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
reference_id VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
465
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
reference_id VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/
466
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
reference_id WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/
467
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
reference_id WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/
468
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
reference_id X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/
469
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
reference_id XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
470
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
reference_id ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/
471
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
reference_id ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-44487, GHSA-2m7v-gc89-fjqf, GHSA-qppj-fm5r-hxr3, GHSA-vx74-f528-fxqg, GHSA-xpw8-rcwv-8f8p, GMS-2023-3377, VSV00013
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5781-s1ny-q7ey
5
url VCID-6bwv-cd3d-mudb
vulnerability_id VCID-6bwv-cd3d-mudb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17559
reference_id
reference_type
scores
0
value 0.01409
scoring_system epss
scoring_elements 0.80677
published_at 2026-05-14T12:55:00Z
1
value 0.01409
scoring_system epss
scoring_elements 0.80636
published_at 2026-05-12T12:55:00Z
2
value 0.01409
scoring_system epss
scoring_elements 0.80433
published_at 2026-04-01T12:55:00Z
3
value 0.01409
scoring_system epss
scoring_elements 0.80439
published_at 2026-04-02T12:55:00Z
4
value 0.01409
scoring_system epss
scoring_elements 0.8046
published_at 2026-04-04T12:55:00Z
5
value 0.01409
scoring_system epss
scoring_elements 0.80449
published_at 2026-04-07T12:55:00Z
6
value 0.01409
scoring_system epss
scoring_elements 0.80478
published_at 2026-04-08T12:55:00Z
7
value 0.01409
scoring_system epss
scoring_elements 0.80488
published_at 2026-04-09T12:55:00Z
8
value 0.01409
scoring_system epss
scoring_elements 0.80506
published_at 2026-04-11T12:55:00Z
9
value 0.01409
scoring_system epss
scoring_elements 0.80492
published_at 2026-04-12T12:55:00Z
10
value 0.01409
scoring_system epss
scoring_elements 0.80484
published_at 2026-04-13T12:55:00Z
11
value 0.01409
scoring_system epss
scoring_elements 0.80513
published_at 2026-04-16T12:55:00Z
12
value 0.01409
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-18T12:55:00Z
13
value 0.01409
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-21T12:55:00Z
14
value 0.01409
scoring_system epss
scoring_elements 0.80543
published_at 2026-04-24T12:55:00Z
15
value 0.01409
scoring_system epss
scoring_elements 0.80547
published_at 2026-04-26T12:55:00Z
16
value 0.01409
scoring_system epss
scoring_elements 0.80563
published_at 2026-04-29T12:55:00Z
17
value 0.01409
scoring_system epss
scoring_elements 0.80583
published_at 2026-05-05T12:55:00Z
18
value 0.01409
scoring_system epss
scoring_elements 0.80605
published_at 2026-05-07T12:55:00Z
19
value 0.01409
scoring_system epss
scoring_elements 0.80624
published_at 2026-05-09T12:55:00Z
20
value 0.01409
scoring_system epss
scoring_elements 0.80619
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17559
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17559
reference_id CVE-2019-17559
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17559
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-17559
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bwv-cd3d-mudb
6
url VCID-73aa-rk27-tye1
vulnerability_id VCID-73aa-rk27-tye1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37392
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63855
published_at 2026-04-02T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63882
published_at 2026-04-04T12:55:00Z
2
value 0.00615
scoring_system epss
scoring_elements 0.69892
published_at 2026-04-09T12:55:00Z
3
value 0.00615
scoring_system epss
scoring_elements 0.69914
published_at 2026-04-11T12:55:00Z
4
value 0.00615
scoring_system epss
scoring_elements 0.69828
published_at 2026-04-07T12:55:00Z
5
value 0.00615
scoring_system epss
scoring_elements 0.69876
published_at 2026-04-08T12:55:00Z
6
value 0.03006
scoring_system epss
scoring_elements 0.86713
published_at 2026-05-14T12:55:00Z
7
value 0.03006
scoring_system epss
scoring_elements 0.86668
published_at 2026-05-11T12:55:00Z
8
value 0.03006
scoring_system epss
scoring_elements 0.8668
published_at 2026-05-12T12:55:00Z
9
value 0.03006
scoring_system epss
scoring_elements 0.86588
published_at 2026-04-12T12:55:00Z
10
value 0.03006
scoring_system epss
scoring_elements 0.86581
published_at 2026-04-13T12:55:00Z
11
value 0.03006
scoring_system epss
scoring_elements 0.86594
published_at 2026-04-16T12:55:00Z
12
value 0.03006
scoring_system epss
scoring_elements 0.86599
published_at 2026-04-18T12:55:00Z
13
value 0.03006
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-21T12:55:00Z
14
value 0.03006
scoring_system epss
scoring_elements 0.8661
published_at 2026-04-24T12:55:00Z
15
value 0.03006
scoring_system epss
scoring_elements 0.86618
published_at 2026-04-26T12:55:00Z
16
value 0.03006
scoring_system epss
scoring_elements 0.86617
published_at 2026-04-29T12:55:00Z
17
value 0.03006
scoring_system epss
scoring_elements 0.86638
published_at 2026-05-05T12:55:00Z
18
value 0.03006
scoring_system epss
scoring_elements 0.86657
published_at 2026-05-07T12:55:00Z
19
value 0.03006
scoring_system epss
scoring_elements 0.86673
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37392
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392
3
reference_url https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
reference_id mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-17T14:20:03Z/
url https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-37392
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73aa-rk27-tye1
7
url VCID-7nhc-5p2x-t3cj
vulnerability_id VCID-7nhc-5p2x-t3cj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-25763
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.55317
published_at 2026-05-12T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55378
published_at 2026-05-14T12:55:00Z
2
value 0.00438
scoring_system epss
scoring_elements 0.63128
published_at 2026-04-12T12:55:00Z
3
value 0.00438
scoring_system epss
scoring_elements 0.6313
published_at 2026-04-21T12:55:00Z
4
value 0.00438
scoring_system epss
scoring_elements 0.63152
published_at 2026-04-24T12:55:00Z
5
value 0.00438
scoring_system epss
scoring_elements 0.63166
published_at 2026-04-26T12:55:00Z
6
value 0.00438
scoring_system epss
scoring_elements 0.63165
published_at 2026-04-29T12:55:00Z
7
value 0.00438
scoring_system epss
scoring_elements 0.63131
published_at 2026-05-05T12:55:00Z
8
value 0.00438
scoring_system epss
scoring_elements 0.63175
published_at 2026-05-07T12:55:00Z
9
value 0.00438
scoring_system epss
scoring_elements 0.63226
published_at 2026-05-09T12:55:00Z
10
value 0.00438
scoring_system epss
scoring_elements 0.63187
published_at 2026-05-11T12:55:00Z
11
value 0.00438
scoring_system epss
scoring_elements 0.63093
published_at 2026-04-04T12:55:00Z
12
value 0.00438
scoring_system epss
scoring_elements 0.63057
published_at 2026-04-07T12:55:00Z
13
value 0.00438
scoring_system epss
scoring_elements 0.63109
published_at 2026-04-08T12:55:00Z
14
value 0.00438
scoring_system epss
scoring_elements 0.63126
published_at 2026-04-09T12:55:00Z
15
value 0.00438
scoring_system epss
scoring_elements 0.63143
published_at 2026-04-11T12:55:00Z
16
value 0.00438
scoring_system epss
scoring_elements 0.63064
published_at 2026-04-02T12:55:00Z
17
value 0.00438
scoring_system epss
scoring_elements 0.63106
published_at 2026-04-13T12:55:00Z
18
value 0.00438
scoring_system epss
scoring_elements 0.63142
published_at 2026-04-16T12:55:00Z
19
value 0.00438
scoring_system epss
scoring_elements 0.63149
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-25763
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
reference_id CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/
8
reference_url https://www.debian.org/security/2022/dsa-5206
reference_id dsa-5206
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/
url https://www.debian.org/security/2022/dsa-5206
9
reference_url https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
reference_id rc64lwbdgrkv674koc3zl1sljr9vwg21
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/
url https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
reference_id ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-25763
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nhc-5p2x-t3cj
8
url VCID-931v-ukcc-6qaa
vulnerability_id VCID-931v-ukcc-6qaa
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44040
reference_id
reference_type
scores
0
value 0.0325
scoring_system epss
scoring_elements 0.87067
published_at 2026-04-01T12:55:00Z
1
value 0.0325
scoring_system epss
scoring_elements 0.87078
published_at 2026-04-02T12:55:00Z
2
value 0.0325
scoring_system epss
scoring_elements 0.87096
published_at 2026-04-04T12:55:00Z
3
value 0.0325
scoring_system epss
scoring_elements 0.87089
published_at 2026-04-07T12:55:00Z
4
value 0.0325
scoring_system epss
scoring_elements 0.8711
published_at 2026-04-08T12:55:00Z
5
value 0.0325
scoring_system epss
scoring_elements 0.87117
published_at 2026-04-09T12:55:00Z
6
value 0.0325
scoring_system epss
scoring_elements 0.8713
published_at 2026-04-11T12:55:00Z
7
value 0.0325
scoring_system epss
scoring_elements 0.87125
published_at 2026-04-12T12:55:00Z
8
value 0.0325
scoring_system epss
scoring_elements 0.8712
published_at 2026-04-13T12:55:00Z
9
value 0.0325
scoring_system epss
scoring_elements 0.87136
published_at 2026-04-21T12:55:00Z
10
value 0.0325
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-18T12:55:00Z
11
value 0.0325
scoring_system epss
scoring_elements 0.87156
published_at 2026-04-24T12:55:00Z
12
value 0.0325
scoring_system epss
scoring_elements 0.87162
published_at 2026-04-26T12:55:00Z
13
value 0.0325
scoring_system epss
scoring_elements 0.87163
published_at 2026-04-29T12:55:00Z
14
value 0.0325
scoring_system epss
scoring_elements 0.87183
published_at 2026-05-05T12:55:00Z
15
value 0.0325
scoring_system epss
scoring_elements 0.87199
published_at 2026-05-07T12:55:00Z
16
value 0.0325
scoring_system epss
scoring_elements 0.87217
published_at 2026-05-09T12:55:00Z
17
value 0.0325
scoring_system epss
scoring_elements 0.87212
published_at 2026-05-11T12:55:00Z
18
value 0.0325
scoring_system epss
scoring_elements 0.87228
published_at 2026-05-12T12:55:00Z
19
value 0.0325
scoring_system epss
scoring_elements 0.87263
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-44040
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-931v-ukcc-6qaa
9
url VCID-aqt5-2ffy-9bgs
vulnerability_id VCID-aqt5-2ffy-9bgs
summary HTTP/2: flood using SETTINGS frames results in unbounded memory growth
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9515
reference_id
reference_type
scores
0
value 0.09046
scoring_system epss
scoring_elements 0.9272
published_at 2026-05-14T12:55:00Z
1
value 0.09046
scoring_system epss
scoring_elements 0.92687
published_at 2026-05-09T12:55:00Z
2
value 0.09046
scoring_system epss
scoring_elements 0.9269
published_at 2026-05-11T12:55:00Z
3
value 0.09046
scoring_system epss
scoring_elements 0.92695
published_at 2026-05-12T12:55:00Z
4
value 0.09046
scoring_system epss
scoring_elements 0.92618
published_at 2026-04-07T12:55:00Z
5
value 0.09046
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-08T12:55:00Z
6
value 0.09046
scoring_system epss
scoring_elements 0.92635
published_at 2026-04-09T12:55:00Z
7
value 0.09046
scoring_system epss
scoring_elements 0.92639
published_at 2026-04-13T12:55:00Z
8
value 0.09046
scoring_system epss
scoring_elements 0.9264
published_at 2026-04-12T12:55:00Z
9
value 0.09046
scoring_system epss
scoring_elements 0.92652
published_at 2026-04-18T12:55:00Z
10
value 0.09046
scoring_system epss
scoring_elements 0.92655
published_at 2026-04-21T12:55:00Z
11
value 0.09046
scoring_system epss
scoring_elements 0.92657
published_at 2026-04-24T12:55:00Z
12
value 0.09046
scoring_system epss
scoring_elements 0.92658
published_at 2026-04-26T12:55:00Z
13
value 0.09046
scoring_system epss
scoring_elements 0.92654
published_at 2026-04-29T12:55:00Z
14
value 0.09046
scoring_system epss
scoring_elements 0.92663
published_at 2026-05-05T12:55:00Z
15
value 0.09046
scoring_system epss
scoring_elements 0.92676
published_at 2026-05-07T12:55:00Z
16
value 0.10394
scoring_system epss
scoring_elements 0.93194
published_at 2026-04-02T12:55:00Z
17
value 0.10394
scoring_system epss
scoring_elements 0.93185
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9515
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735745
reference_id 1735745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735745
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
11
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
12
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
13
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
14
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
15
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
16
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
17
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
18
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
19
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9515
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aqt5-2ffy-9bgs
10
url VCID-b7zx-ywwc-57d9
vulnerability_id VCID-b7zx-ywwc-57d9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31778
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40448
published_at 2026-04-02T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40474
published_at 2026-04-04T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68025
published_at 2026-04-07T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68076
published_at 2026-04-08T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.6809
published_at 2026-04-09T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68115
published_at 2026-04-11T12:55:00Z
6
value 0.02716
scoring_system epss
scoring_elements 0.8593
published_at 2026-04-12T12:55:00Z
7
value 0.02716
scoring_system epss
scoring_elements 0.85925
published_at 2026-04-13T12:55:00Z
8
value 0.02716
scoring_system epss
scoring_elements 0.85944
published_at 2026-04-16T12:55:00Z
9
value 0.02716
scoring_system epss
scoring_elements 0.85947
published_at 2026-04-18T12:55:00Z
10
value 0.02716
scoring_system epss
scoring_elements 0.85938
published_at 2026-04-21T12:55:00Z
11
value 0.02716
scoring_system epss
scoring_elements 0.85958
published_at 2026-04-24T12:55:00Z
12
value 0.02716
scoring_system epss
scoring_elements 0.85967
published_at 2026-04-29T12:55:00Z
13
value 0.02716
scoring_system epss
scoring_elements 0.85987
published_at 2026-05-05T12:55:00Z
14
value 0.02716
scoring_system epss
scoring_elements 0.86009
published_at 2026-05-07T12:55:00Z
15
value 0.02716
scoring_system epss
scoring_elements 0.86027
published_at 2026-05-09T12:55:00Z
16
value 0.02716
scoring_system epss
scoring_elements 0.86024
published_at 2026-05-11T12:55:00Z
17
value 0.02716
scoring_system epss
scoring_elements 0.86038
published_at 2026-05-12T12:55:00Z
18
value 0.02716
scoring_system epss
scoring_elements 0.86077
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31778
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-31778
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7zx-ywwc-57d9
11
url VCID-bb5y-kjej-bbfm
vulnerability_id VCID-bb5y-kjej-bbfm
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28129
reference_id
reference_type
scores
0
value 0.02871
scoring_system epss
scoring_elements 0.86419
published_at 2026-05-14T12:55:00Z
1
value 0.02871
scoring_system epss
scoring_elements 0.86284
published_at 2026-04-21T12:55:00Z
2
value 0.02871
scoring_system epss
scoring_elements 0.86303
published_at 2026-04-24T12:55:00Z
3
value 0.02871
scoring_system epss
scoring_elements 0.86313
published_at 2026-04-26T12:55:00Z
4
value 0.02871
scoring_system epss
scoring_elements 0.86312
published_at 2026-04-29T12:55:00Z
5
value 0.02871
scoring_system epss
scoring_elements 0.86332
published_at 2026-05-05T12:55:00Z
6
value 0.02871
scoring_system epss
scoring_elements 0.86353
published_at 2026-05-07T12:55:00Z
7
value 0.02871
scoring_system epss
scoring_elements 0.86372
published_at 2026-05-09T12:55:00Z
8
value 0.02871
scoring_system epss
scoring_elements 0.86369
published_at 2026-05-11T12:55:00Z
9
value 0.02871
scoring_system epss
scoring_elements 0.86382
published_at 2026-05-12T12:55:00Z
10
value 0.04574
scoring_system epss
scoring_elements 0.89184
published_at 2026-04-04T12:55:00Z
11
value 0.04574
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-07T12:55:00Z
12
value 0.04574
scoring_system epss
scoring_elements 0.89205
published_at 2026-04-08T12:55:00Z
13
value 0.04574
scoring_system epss
scoring_elements 0.89209
published_at 2026-04-09T12:55:00Z
14
value 0.04574
scoring_system epss
scoring_elements 0.89219
published_at 2026-04-11T12:55:00Z
15
value 0.04574
scoring_system epss
scoring_elements 0.89215
published_at 2026-04-12T12:55:00Z
16
value 0.04574
scoring_system epss
scoring_elements 0.89213
published_at 2026-04-13T12:55:00Z
17
value 0.04574
scoring_system epss
scoring_elements 0.89225
published_at 2026-04-18T12:55:00Z
18
value 0.04574
scoring_system epss
scoring_elements 0.8917
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28129
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-28129
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5y-kjej-bbfm
12
url VCID-bdgg-edbf-xfav
vulnerability_id VCID-bdgg-edbf-xfav
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47184
reference_id
reference_type
scores
0
value 0.00235
scoring_system epss
scoring_elements 0.46442
published_at 2026-05-14T12:55:00Z
1
value 0.00235
scoring_system epss
scoring_elements 0.46519
published_at 2026-04-18T12:55:00Z
2
value 0.00235
scoring_system epss
scoring_elements 0.46464
published_at 2026-04-21T12:55:00Z
3
value 0.00235
scoring_system epss
scoring_elements 0.46445
published_at 2026-04-24T12:55:00Z
4
value 0.00235
scoring_system epss
scoring_elements 0.46403
published_at 2026-04-29T12:55:00Z
5
value 0.00235
scoring_system epss
scoring_elements 0.46308
published_at 2026-05-05T12:55:00Z
6
value 0.00235
scoring_system epss
scoring_elements 0.46375
published_at 2026-05-07T12:55:00Z
7
value 0.00235
scoring_system epss
scoring_elements 0.46394
published_at 2026-05-09T12:55:00Z
8
value 0.00235
scoring_system epss
scoring_elements 0.46338
published_at 2026-05-11T12:55:00Z
9
value 0.00235
scoring_system epss
scoring_elements 0.46372
published_at 2026-05-12T12:55:00Z
10
value 0.00235
scoring_system epss
scoring_elements 0.46436
published_at 2026-04-02T12:55:00Z
11
value 0.00235
scoring_system epss
scoring_elements 0.46456
published_at 2026-04-26T12:55:00Z
12
value 0.00235
scoring_system epss
scoring_elements 0.46405
published_at 2026-04-07T12:55:00Z
13
value 0.00235
scoring_system epss
scoring_elements 0.46461
published_at 2026-04-09T12:55:00Z
14
value 0.00235
scoring_system epss
scoring_elements 0.46484
published_at 2026-04-11T12:55:00Z
15
value 0.00235
scoring_system epss
scoring_elements 0.46455
published_at 2026-04-12T12:55:00Z
16
value 0.00235
scoring_system epss
scoring_elements 0.46465
published_at 2026-04-13T12:55:00Z
17
value 0.00235
scoring_system epss
scoring_elements 0.46522
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47184
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
reference_id 1038248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
reference_id 6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
6
reference_url https://www.debian.org/security/2023/dsa-5435
reference_id dsa-5435
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://www.debian.org/security/2023/dsa-5435
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
reference_id FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
8
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html
9
reference_url https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
reference_id tns2b4khyyncgs5v5p9y35pobg9z2bvs
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/
url https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-47184
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdgg-edbf-xfav
13
url VCID-btm9-vxvc-3qhv
vulnerability_id VCID-btm9-vxvc-3qhv
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10079
reference_id
reference_type
scores
0
value 0.05102
scoring_system epss
scoring_elements 0.89914
published_at 2026-05-14T12:55:00Z
1
value 0.05102
scoring_system epss
scoring_elements 0.89897
published_at 2026-05-12T12:55:00Z
2
value 0.05102
scoring_system epss
scoring_elements 0.8979
published_at 2026-04-01T12:55:00Z
3
value 0.05102
scoring_system epss
scoring_elements 0.89793
published_at 2026-04-02T12:55:00Z
4
value 0.05102
scoring_system epss
scoring_elements 0.89807
published_at 2026-04-04T12:55:00Z
5
value 0.05102
scoring_system epss
scoring_elements 0.89811
published_at 2026-04-07T12:55:00Z
6
value 0.05102
scoring_system epss
scoring_elements 0.89828
published_at 2026-04-08T12:55:00Z
7
value 0.05102
scoring_system epss
scoring_elements 0.89835
published_at 2026-04-09T12:55:00Z
8
value 0.05102
scoring_system epss
scoring_elements 0.89841
published_at 2026-04-11T12:55:00Z
9
value 0.05102
scoring_system epss
scoring_elements 0.89839
published_at 2026-04-12T12:55:00Z
10
value 0.05102
scoring_system epss
scoring_elements 0.89832
published_at 2026-04-13T12:55:00Z
11
value 0.05102
scoring_system epss
scoring_elements 0.89846
published_at 2026-04-18T12:55:00Z
12
value 0.05102
scoring_system epss
scoring_elements 0.8984
published_at 2026-04-21T12:55:00Z
13
value 0.05102
scoring_system epss
scoring_elements 0.89855
published_at 2026-04-26T12:55:00Z
14
value 0.05102
scoring_system epss
scoring_elements 0.89854
published_at 2026-04-29T12:55:00Z
15
value 0.05102
scoring_system epss
scoring_elements 0.89867
published_at 2026-05-05T12:55:00Z
16
value 0.05102
scoring_system epss
scoring_elements 0.89883
published_at 2026-05-07T12:55:00Z
17
value 0.05102
scoring_system epss
scoring_elements 0.89894
published_at 2026-05-09T12:55:00Z
18
value 0.05102
scoring_system epss
scoring_elements 0.89889
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10079
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
6
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10079
reference_id CVE-2019-10079
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10079
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-10079
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btm9-vxvc-3qhv
14
url VCID-c5hc-3jtx-k3a6
vulnerability_id VCID-c5hc-3jtx-k3a6
summary HTTP/2: flood using empty frames results in excessive resource consumption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9518.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9518
reference_id
reference_type
scores
0
value 0.03645
scoring_system epss
scoring_elements 0.87975
published_at 2026-05-14T12:55:00Z
1
value 0.03645
scoring_system epss
scoring_elements 0.87932
published_at 2026-05-09T12:55:00Z
2
value 0.03645
scoring_system epss
scoring_elements 0.87929
published_at 2026-05-11T12:55:00Z
3
value 0.03645
scoring_system epss
scoring_elements 0.87942
published_at 2026-05-12T12:55:00Z
4
value 0.03645
scoring_system epss
scoring_elements 0.87825
published_at 2026-04-04T12:55:00Z
5
value 0.03645
scoring_system epss
scoring_elements 0.87829
published_at 2026-04-07T12:55:00Z
6
value 0.03645
scoring_system epss
scoring_elements 0.8785
published_at 2026-04-08T12:55:00Z
7
value 0.03645
scoring_system epss
scoring_elements 0.87857
published_at 2026-04-09T12:55:00Z
8
value 0.03645
scoring_system epss
scoring_elements 0.87868
published_at 2026-04-11T12:55:00Z
9
value 0.03645
scoring_system epss
scoring_elements 0.87862
published_at 2026-04-12T12:55:00Z
10
value 0.03645
scoring_system epss
scoring_elements 0.8786
published_at 2026-04-13T12:55:00Z
11
value 0.03645
scoring_system epss
scoring_elements 0.87874
published_at 2026-04-16T12:55:00Z
12
value 0.03645
scoring_system epss
scoring_elements 0.87873
published_at 2026-04-18T12:55:00Z
13
value 0.03645
scoring_system epss
scoring_elements 0.8787
published_at 2026-04-21T12:55:00Z
14
value 0.03645
scoring_system epss
scoring_elements 0.87887
published_at 2026-04-24T12:55:00Z
15
value 0.03645
scoring_system epss
scoring_elements 0.87893
published_at 2026-04-26T12:55:00Z
16
value 0.03645
scoring_system epss
scoring_elements 0.8789
published_at 2026-04-29T12:55:00Z
17
value 0.03645
scoring_system epss
scoring_elements 0.87901
published_at 2026-05-05T12:55:00Z
18
value 0.03645
scoring_system epss
scoring_elements 0.87916
published_at 2026-05-07T12:55:00Z
19
value 0.04696
scoring_system epss
scoring_elements 0.89316
published_at 2026-04-02T12:55:00Z
20
value 0.04696
scoring_system epss
scoring_elements 0.89311
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735749
reference_id 1735749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735749
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935314
reference_id 935314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935314
10
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
11
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
12
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
13
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
14
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
15
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9518
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c5hc-3jtx-k3a6
15
url VCID-c675-5njd-63hk
vulnerability_id VCID-c675-5njd-63hk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27577
reference_id
reference_type
scores
0
value 0.01205
scoring_system epss
scoring_elements 0.78899
published_at 2026-04-01T12:55:00Z
1
value 0.01205
scoring_system epss
scoring_elements 0.78905
published_at 2026-04-02T12:55:00Z
2
value 0.01205
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-04T12:55:00Z
3
value 0.01205
scoring_system epss
scoring_elements 0.78917
published_at 2026-04-07T12:55:00Z
4
value 0.01205
scoring_system epss
scoring_elements 0.78942
published_at 2026-04-08T12:55:00Z
5
value 0.01205
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-09T12:55:00Z
6
value 0.01205
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-18T12:55:00Z
7
value 0.01205
scoring_system epss
scoring_elements 0.78957
published_at 2026-04-12T12:55:00Z
8
value 0.01205
scoring_system epss
scoring_elements 0.78947
published_at 2026-04-13T12:55:00Z
9
value 0.01205
scoring_system epss
scoring_elements 0.78975
published_at 2026-04-16T12:55:00Z
10
value 0.01205
scoring_system epss
scoring_elements 0.78971
published_at 2026-04-21T12:55:00Z
11
value 0.01205
scoring_system epss
scoring_elements 0.79001
published_at 2026-04-24T12:55:00Z
12
value 0.01205
scoring_system epss
scoring_elements 0.79008
published_at 2026-04-26T12:55:00Z
13
value 0.01205
scoring_system epss
scoring_elements 0.79024
published_at 2026-04-29T12:55:00Z
14
value 0.01205
scoring_system epss
scoring_elements 0.79039
published_at 2026-05-05T12:55:00Z
15
value 0.01205
scoring_system epss
scoring_elements 0.7906
published_at 2026-05-07T12:55:00Z
16
value 0.01205
scoring_system epss
scoring_elements 0.79074
published_at 2026-05-09T12:55:00Z
17
value 0.01205
scoring_system epss
scoring_elements 0.79072
published_at 2026-05-11T12:55:00Z
18
value 0.01205
scoring_system epss
scoring_elements 0.79088
published_at 2026-05-12T12:55:00Z
19
value 0.01205
scoring_system epss
scoring_elements 0.79125
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27577
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-27577
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c675-5njd-63hk
16
url VCID-cbe5-hhz8-bqbn
vulnerability_id VCID-cbe5-hhz8-bqbn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44759
reference_id
reference_type
scores
0
value 0.02005
scoring_system epss
scoring_elements 0.83612
published_at 2026-04-01T12:55:00Z
1
value 0.02005
scoring_system epss
scoring_elements 0.83625
published_at 2026-04-02T12:55:00Z
2
value 0.02005
scoring_system epss
scoring_elements 0.83639
published_at 2026-04-04T12:55:00Z
3
value 0.02005
scoring_system epss
scoring_elements 0.83641
published_at 2026-04-07T12:55:00Z
4
value 0.02005
scoring_system epss
scoring_elements 0.83665
published_at 2026-04-08T12:55:00Z
5
value 0.02005
scoring_system epss
scoring_elements 0.83672
published_at 2026-04-09T12:55:00Z
6
value 0.02005
scoring_system epss
scoring_elements 0.83689
published_at 2026-04-11T12:55:00Z
7
value 0.02005
scoring_system epss
scoring_elements 0.83682
published_at 2026-04-12T12:55:00Z
8
value 0.02005
scoring_system epss
scoring_elements 0.83678
published_at 2026-04-13T12:55:00Z
9
value 0.02005
scoring_system epss
scoring_elements 0.83713
published_at 2026-04-16T12:55:00Z
10
value 0.02005
scoring_system epss
scoring_elements 0.83714
published_at 2026-04-21T12:55:00Z
11
value 0.02005
scoring_system epss
scoring_elements 0.83739
published_at 2026-04-24T12:55:00Z
12
value 0.02005
scoring_system epss
scoring_elements 0.83747
published_at 2026-04-26T12:55:00Z
13
value 0.02005
scoring_system epss
scoring_elements 0.83754
published_at 2026-04-29T12:55:00Z
14
value 0.02005
scoring_system epss
scoring_elements 0.83777
published_at 2026-05-05T12:55:00Z
15
value 0.02005
scoring_system epss
scoring_elements 0.83797
published_at 2026-05-07T12:55:00Z
16
value 0.02005
scoring_system epss
scoring_elements 0.83814
published_at 2026-05-11T12:55:00Z
17
value 0.02005
scoring_system epss
scoring_elements 0.8383
published_at 2026-05-12T12:55:00Z
18
value 0.02005
scoring_system epss
scoring_elements 0.83864
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44759
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-44759
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbe5-hhz8-bqbn
17
url VCID-cscf-sb71-jybq
vulnerability_id VCID-cscf-sb71-jybq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32566
reference_id
reference_type
scores
0
value 0.07927
scoring_system epss
scoring_elements 0.92013
published_at 2026-04-01T12:55:00Z
1
value 0.07927
scoring_system epss
scoring_elements 0.92019
published_at 2026-04-02T12:55:00Z
2
value 0.07927
scoring_system epss
scoring_elements 0.92027
published_at 2026-04-04T12:55:00Z
3
value 0.07927
scoring_system epss
scoring_elements 0.92032
published_at 2026-04-07T12:55:00Z
4
value 0.07927
scoring_system epss
scoring_elements 0.92044
published_at 2026-04-08T12:55:00Z
5
value 0.07927
scoring_system epss
scoring_elements 0.92047
published_at 2026-04-09T12:55:00Z
6
value 0.07927
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-12T12:55:00Z
7
value 0.07927
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-13T12:55:00Z
8
value 0.07927
scoring_system epss
scoring_elements 0.92066
published_at 2026-04-24T12:55:00Z
9
value 0.07927
scoring_system epss
scoring_elements 0.92063
published_at 2026-04-18T12:55:00Z
10
value 0.07927
scoring_system epss
scoring_elements 0.92061
published_at 2026-04-21T12:55:00Z
11
value 0.07927
scoring_system epss
scoring_elements 0.92064
published_at 2026-04-26T12:55:00Z
12
value 0.07927
scoring_system epss
scoring_elements 0.9206
published_at 2026-04-29T12:55:00Z
13
value 0.07927
scoring_system epss
scoring_elements 0.92072
published_at 2026-05-05T12:55:00Z
14
value 0.07927
scoring_system epss
scoring_elements 0.92085
published_at 2026-05-07T12:55:00Z
15
value 0.07927
scoring_system epss
scoring_elements 0.92093
published_at 2026-05-11T12:55:00Z
16
value 0.07927
scoring_system epss
scoring_elements 0.921
published_at 2026-05-12T12:55:00Z
17
value 0.07927
scoring_system epss
scoring_elements 0.9212
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32566
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32566
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cscf-sb71-jybq
18
url VCID-esap-nkps-cfg9
vulnerability_id VCID-esap-nkps-cfg9
summary Invalid Accept-Encoding header can cause Apache Traffic Server to fail cache lookup and force forwarding requests. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35296
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.30689
published_at 2026-05-14T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.30623
published_at 2026-05-12T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.3068
published_at 2026-05-09T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.30601
published_at 2026-05-11T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31464
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31494
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31499
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31419
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31453
published_at 2026-04-16T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31401
published_at 2026-04-21T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31228
published_at 2026-04-24T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31104
published_at 2026-04-26T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31025
published_at 2026-04-29T12:55:00Z
14
value 0.00123
scoring_system epss
scoring_elements 0.30874
published_at 2026-05-05T12:55:00Z
15
value 0.00123
scoring_system epss
scoring_elements 0.30944
published_at 2026-05-07T12:55:00Z
16
value 0.00123
scoring_system epss
scoring_elements 0.31432
published_at 2026-04-18T12:55:00Z
17
value 0.00123
scoring_system epss
scoring_elements 0.31553
published_at 2026-04-02T12:55:00Z
18
value 0.00123
scoring_system epss
scoring_elements 0.31595
published_at 2026-04-04T12:55:00Z
19
value 0.00123
scoring_system epss
scoring_elements 0.31411
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35296
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35296
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
reference_id 1077141
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
3
reference_url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_id c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T14:01:18Z/
url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2024-35296
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esap-nkps-cfg9
19
url VCID-fmwc-nmhh-ryaf
vulnerability_id VCID-fmwc-nmhh-ryaf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9481
reference_id
reference_type
scores
0
value 0.05231
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-01T12:55:00Z
1
value 0.05231
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-02T12:55:00Z
2
value 0.05231
scoring_system epss
scoring_elements 0.89932
published_at 2026-04-04T12:55:00Z
3
value 0.05231
scoring_system epss
scoring_elements 0.89938
published_at 2026-04-07T12:55:00Z
4
value 0.05231
scoring_system epss
scoring_elements 0.89955
published_at 2026-04-08T12:55:00Z
5
value 0.05231
scoring_system epss
scoring_elements 0.8996
published_at 2026-04-13T12:55:00Z
6
value 0.05231
scoring_system epss
scoring_elements 0.89968
published_at 2026-04-11T12:55:00Z
7
value 0.05231
scoring_system epss
scoring_elements 0.89966
published_at 2026-04-12T12:55:00Z
8
value 0.05231
scoring_system epss
scoring_elements 0.89974
published_at 2026-04-16T12:55:00Z
9
value 0.05231
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-18T12:55:00Z
10
value 0.05231
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-21T12:55:00Z
11
value 0.05231
scoring_system epss
scoring_elements 0.89988
published_at 2026-04-24T12:55:00Z
12
value 0.05231
scoring_system epss
scoring_elements 0.89987
published_at 2026-04-26T12:55:00Z
13
value 0.05231
scoring_system epss
scoring_elements 0.89986
published_at 2026-04-29T12:55:00Z
14
value 0.05231
scoring_system epss
scoring_elements 0.9
published_at 2026-05-05T12:55:00Z
15
value 0.05231
scoring_system epss
scoring_elements 0.90014
published_at 2026-05-07T12:55:00Z
16
value 0.05231
scoring_system epss
scoring_elements 0.90026
published_at 2026-05-09T12:55:00Z
17
value 0.05231
scoring_system epss
scoring_elements 0.90021
published_at 2026-05-11T12:55:00Z
18
value 0.05231
scoring_system epss
scoring_elements 0.90029
published_at 2026-05-12T12:55:00Z
19
value 0.05231
scoring_system epss
scoring_elements 0.90044
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9481
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-9481
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fmwc-nmhh-ryaf
20
url VCID-fq5y-b9yq-nbee
vulnerability_id VCID-fq5y-b9yq-nbee
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37148
reference_id
reference_type
scores
0
value 0.01007
scoring_system epss
scoring_elements 0.76995
published_at 2026-04-01T12:55:00Z
1
value 0.01007
scoring_system epss
scoring_elements 0.77001
published_at 2026-04-02T12:55:00Z
2
value 0.01007
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-04T12:55:00Z
3
value 0.01007
scoring_system epss
scoring_elements 0.77011
published_at 2026-04-07T12:55:00Z
4
value 0.01007
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-08T12:55:00Z
5
value 0.01007
scoring_system epss
scoring_elements 0.77053
published_at 2026-04-09T12:55:00Z
6
value 0.01007
scoring_system epss
scoring_elements 0.77082
published_at 2026-04-11T12:55:00Z
7
value 0.01007
scoring_system epss
scoring_elements 0.77061
published_at 2026-04-12T12:55:00Z
8
value 0.01007
scoring_system epss
scoring_elements 0.77056
published_at 2026-04-13T12:55:00Z
9
value 0.01007
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-16T12:55:00Z
10
value 0.01007
scoring_system epss
scoring_elements 0.77099
published_at 2026-04-18T12:55:00Z
11
value 0.01007
scoring_system epss
scoring_elements 0.7709
published_at 2026-04-21T12:55:00Z
12
value 0.01007
scoring_system epss
scoring_elements 0.77125
published_at 2026-04-24T12:55:00Z
13
value 0.01007
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-26T12:55:00Z
14
value 0.01007
scoring_system epss
scoring_elements 0.77146
published_at 2026-04-29T12:55:00Z
15
value 0.01363
scoring_system epss
scoring_elements 0.80274
published_at 2026-05-05T12:55:00Z
16
value 0.01363
scoring_system epss
scoring_elements 0.80297
published_at 2026-05-07T12:55:00Z
17
value 0.01363
scoring_system epss
scoring_elements 0.80313
published_at 2026-05-09T12:55:00Z
18
value 0.01363
scoring_system epss
scoring_elements 0.80309
published_at 2026-05-11T12:55:00Z
19
value 0.01363
scoring_system epss
scoring_elements 0.80326
published_at 2026-05-12T12:55:00Z
20
value 0.01363
scoring_system epss
scoring_elements 0.80367
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37148
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37148
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fq5y-b9yq-nbee
21
url VCID-hbte-dsw2-y7ad
vulnerability_id VCID-hbte-dsw2-y7ad
summary
golang.org/x/net/http vulnerable to ping floods
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

### Specific Go Packages Affected
golang.org/x/net/http2
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
7
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2594
8
reference_url https://access.redhat.com/errata/RHSA-2019:2661
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2661
9
reference_url https://access.redhat.com/errata/RHSA-2019:2682
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2682
10
reference_url https://access.redhat.com/errata/RHSA-2019:2690
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2690
11
reference_url https://access.redhat.com/errata/RHSA-2019:2726
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2726
12
reference_url https://access.redhat.com/errata/RHSA-2019:2766
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2766
13
reference_url https://access.redhat.com/errata/RHSA-2019:2769
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2769
14
reference_url https://access.redhat.com/errata/RHSA-2019:2796
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2796
15
reference_url https://access.redhat.com/errata/RHSA-2019:2861
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2861
16
reference_url https://access.redhat.com/errata/RHSA-2019:2925
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2925
17
reference_url https://access.redhat.com/errata/RHSA-2019:2939
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2939
18
reference_url https://access.redhat.com/errata/RHSA-2019:2955
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2955
19
reference_url https://access.redhat.com/errata/RHSA-2019:2966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2966
20
reference_url https://access.redhat.com/errata/RHSA-2019:3131
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3131
21
reference_url https://access.redhat.com/errata/RHSA-2019:3245
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3245
22
reference_url https://access.redhat.com/errata/RHSA-2019:3265
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3265
23
reference_url https://access.redhat.com/errata/RHSA-2019:3892
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3892
24
reference_url https://access.redhat.com/errata/RHSA-2019:3906
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3906
25
reference_url https://access.redhat.com/errata/RHSA-2019:4018
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4018
26
reference_url https://access.redhat.com/errata/RHSA-2019:4019
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4019
27
reference_url https://access.redhat.com/errata/RHSA-2019:4020
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4020
28
reference_url https://access.redhat.com/errata/RHSA-2019:4021
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4021
29
reference_url https://access.redhat.com/errata/RHSA-2019:4040
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4040
30
reference_url https://access.redhat.com/errata/RHSA-2019:4041
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4041
31
reference_url https://access.redhat.com/errata/RHSA-2019:4042
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4042
32
reference_url https://access.redhat.com/errata/RHSA-2019:4045
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4045
33
reference_url https://access.redhat.com/errata/RHSA-2019:4269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4269
34
reference_url https://access.redhat.com/errata/RHSA-2019:4273
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4273
35
reference_url https://access.redhat.com/errata/RHSA-2019:4352
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4352
36
reference_url https://access.redhat.com/errata/RHSA-2020:0406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0406
37
reference_url https://access.redhat.com/errata/RHSA-2020:0727
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0727
38
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9512.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9512.json
39
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9512
reference_id
reference_type
scores
0
value 0.51232
scoring_system epss
scoring_elements 0.97904
published_at 2026-05-14T12:55:00Z
1
value 0.51232
scoring_system epss
scoring_elements 0.97858
published_at 2026-04-01T12:55:00Z
2
value 0.51232
scoring_system epss
scoring_elements 0.97864
published_at 2026-04-02T12:55:00Z
3
value 0.51232
scoring_system epss
scoring_elements 0.97866
published_at 2026-04-04T12:55:00Z
4
value 0.51232
scoring_system epss
scoring_elements 0.97869
published_at 2026-04-07T12:55:00Z
5
value 0.51232
scoring_system epss
scoring_elements 0.97873
published_at 2026-04-08T12:55:00Z
6
value 0.51232
scoring_system epss
scoring_elements 0.97876
published_at 2026-04-09T12:55:00Z
7
value 0.51232
scoring_system epss
scoring_elements 0.97879
published_at 2026-04-11T12:55:00Z
8
value 0.51232
scoring_system epss
scoring_elements 0.9788
published_at 2026-04-12T12:55:00Z
9
value 0.51232
scoring_system epss
scoring_elements 0.97881
published_at 2026-04-13T12:55:00Z
10
value 0.51232
scoring_system epss
scoring_elements 0.97888
published_at 2026-04-21T12:55:00Z
11
value 0.51232
scoring_system epss
scoring_elements 0.9789
published_at 2026-04-18T12:55:00Z
12
value 0.51232
scoring_system epss
scoring_elements 0.97886
published_at 2026-04-24T12:55:00Z
13
value 0.51232
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-26T12:55:00Z
14
value 0.51232
scoring_system epss
scoring_elements 0.97891
published_at 2026-04-29T12:55:00Z
15
value 0.51232
scoring_system epss
scoring_elements 0.97896
published_at 2026-05-05T12:55:00Z
16
value 0.51232
scoring_system epss
scoring_elements 0.97894
published_at 2026-05-07T12:55:00Z
17
value 0.51232
scoring_system epss
scoring_elements 0.97897
published_at 2026-05-11T12:55:00Z
18
value 0.51232
scoring_system epss
scoring_elements 0.979
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9512
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
46
reference_url http://seclists.org/fulldisclosure/2019/Aug/16
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2019/Aug/16
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
49
reference_url https://go.dev/cl/190137
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/190137
50
reference_url https://go.dev/issue/33606
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/33606
51
reference_url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
52
reference_url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
53
reference_url https://kb.cert.org/vuls/id/605641
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kb.cert.org/vuls/id/605641
54
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
55
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
56
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
57
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
58
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
59
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9512
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-9512
64
reference_url https://pkg.go.dev/vuln/GO-2022-0536
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0536
65
reference_url https://seclists.org/bugtraq/2019/Aug/24
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/24
66
reference_url https://seclists.org/bugtraq/2019/Aug/31
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/31
67
reference_url https://seclists.org/bugtraq/2019/Aug/43
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/43
68
reference_url https://seclists.org/bugtraq/2019/Sep/18
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Sep/18
69
reference_url https://security.netapp.com/advisory/ntap-20190823-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0001
70
reference_url https://security.netapp.com/advisory/ntap-20190823-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0004
71
reference_url https://security.netapp.com/advisory/ntap-20190823-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0005
72
reference_url https://support.f5.com/csp/article/K98053339
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K98053339
73
reference_url https://support.f5.com/csp/article/K98053339?utm_source=f5support&utm_medium=RSS
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K98053339?utm_source=f5support&utm_medium=RSS
74
reference_url https://usn.ubuntu.com/4308-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4308-1
75
reference_url https://www.debian.org/security/2019/dsa-4503
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4503
76
reference_url https://www.debian.org/security/2019/dsa-4508
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4508
77
reference_url https://www.debian.org/security/2019/dsa-4520
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4520
78
reference_url https://www.synology.com/security/advisory/Synology_SA_19_33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.synology.com/security/advisory/Synology_SA_19_33
79
reference_url http://www.openwall.com/lists/oss-security/2019/08/20/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/08/20/1
80
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735645
reference_id 1735645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735645
81
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
82
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
83
reference_url https://security.archlinux.org/ASA-201908-15
reference_id ASA-201908-15
reference_type
scores
url https://security.archlinux.org/ASA-201908-15
84
reference_url https://security.archlinux.org/AVG-1021
reference_id AVG-1021
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1021
85
reference_url https://access.redhat.com/errata/RHSA-2019:2817
reference_id RHSA-2019:2817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2817
86
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
87
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
88
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
89
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
90
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
91
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
92
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
93
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
94
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9512, GHSA-hgr8-6h9x-f7q9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hbte-dsw2-y7ad
22
url VCID-j6r7-ypa1-zybv
vulnerability_id VCID-j6r7-ypa1-zybv
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17509
reference_id
reference_type
scores
0
value 0.03046
scoring_system epss
scoring_elements 0.86623
published_at 2026-04-01T12:55:00Z
1
value 0.03046
scoring_system epss
scoring_elements 0.86635
published_at 2026-04-02T12:55:00Z
2
value 0.03046
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-04T12:55:00Z
3
value 0.03046
scoring_system epss
scoring_elements 0.86653
published_at 2026-04-07T12:55:00Z
4
value 0.03046
scoring_system epss
scoring_elements 0.86673
published_at 2026-04-08T12:55:00Z
5
value 0.03046
scoring_system epss
scoring_elements 0.86682
published_at 2026-04-09T12:55:00Z
6
value 0.03046
scoring_system epss
scoring_elements 0.86696
published_at 2026-04-11T12:55:00Z
7
value 0.03046
scoring_system epss
scoring_elements 0.86693
published_at 2026-04-12T12:55:00Z
8
value 0.03046
scoring_system epss
scoring_elements 0.86686
published_at 2026-04-13T12:55:00Z
9
value 0.03046
scoring_system epss
scoring_elements 0.867
published_at 2026-04-16T12:55:00Z
10
value 0.03046
scoring_system epss
scoring_elements 0.86706
published_at 2026-04-18T12:55:00Z
11
value 0.03046
scoring_system epss
scoring_elements 0.86699
published_at 2026-04-21T12:55:00Z
12
value 0.03046
scoring_system epss
scoring_elements 0.86717
published_at 2026-04-24T12:55:00Z
13
value 0.03046
scoring_system epss
scoring_elements 0.86725
published_at 2026-04-26T12:55:00Z
14
value 0.03046
scoring_system epss
scoring_elements 0.86726
published_at 2026-04-29T12:55:00Z
15
value 0.03046
scoring_system epss
scoring_elements 0.86747
published_at 2026-05-05T12:55:00Z
16
value 0.03046
scoring_system epss
scoring_elements 0.86765
published_at 2026-05-07T12:55:00Z
17
value 0.03046
scoring_system epss
scoring_elements 0.86782
published_at 2026-05-09T12:55:00Z
18
value 0.03046
scoring_system epss
scoring_elements 0.86777
published_at 2026-05-11T12:55:00Z
19
value 0.03046
scoring_system epss
scoring_elements 0.86789
published_at 2026-05-12T12:55:00Z
20
value 0.03046
scoring_system epss
scoring_elements 0.8682
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17509
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-17509
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6r7-ypa1-zybv
23
url VCID-jabw-thzt-63bb
vulnerability_id VCID-jabw-thzt-63bb
summary Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-50306
reference_id
reference_type
scores
0
value 0.0082
scoring_system epss
scoring_elements 0.74558
published_at 2026-05-14T12:55:00Z
1
value 0.0082
scoring_system epss
scoring_elements 0.74481
published_at 2026-05-11T12:55:00Z
2
value 0.0082
scoring_system epss
scoring_elements 0.74502
published_at 2026-05-12T12:55:00Z
3
value 0.0082
scoring_system epss
scoring_elements 0.74345
published_at 2026-04-02T12:55:00Z
4
value 0.0082
scoring_system epss
scoring_elements 0.74372
published_at 2026-04-04T12:55:00Z
5
value 0.0082
scoring_system epss
scoring_elements 0.74346
published_at 2026-04-07T12:55:00Z
6
value 0.0082
scoring_system epss
scoring_elements 0.74379
published_at 2026-04-08T12:55:00Z
7
value 0.0082
scoring_system epss
scoring_elements 0.74394
published_at 2026-04-09T12:55:00Z
8
value 0.0082
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-11T12:55:00Z
9
value 0.0082
scoring_system epss
scoring_elements 0.74395
published_at 2026-04-12T12:55:00Z
10
value 0.0082
scoring_system epss
scoring_elements 0.74387
published_at 2026-04-13T12:55:00Z
11
value 0.0082
scoring_system epss
scoring_elements 0.74424
published_at 2026-04-16T12:55:00Z
12
value 0.0082
scoring_system epss
scoring_elements 0.74433
published_at 2026-04-18T12:55:00Z
13
value 0.0082
scoring_system epss
scoring_elements 0.74422
published_at 2026-04-21T12:55:00Z
14
value 0.0082
scoring_system epss
scoring_elements 0.74456
published_at 2026-04-24T12:55:00Z
15
value 0.0082
scoring_system epss
scoring_elements 0.74464
published_at 2026-04-26T12:55:00Z
16
value 0.0082
scoring_system epss
scoring_elements 0.74462
published_at 2026-04-29T12:55:00Z
17
value 0.0082
scoring_system epss
scoring_elements 0.7446
published_at 2026-05-05T12:55:00Z
18
value 0.0082
scoring_system epss
scoring_elements 0.74489
published_at 2026-05-07T12:55:00Z
19
value 0.0082
scoring_system epss
scoring_elements 0.74515
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-50306
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50306
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531
reference_id 1087531
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531
3
reference_url https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
reference_id y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:07:42Z/
url https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2024-50306
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jabw-thzt-63bb
24
url VCID-jb1b-9gr2-suez
vulnerability_id VCID-jb1b-9gr2-suez
summary Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users can set a new setting (proxy.config.http.drop_chunked_trailers) not to forward chunked trailer section. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-35161
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44089
published_at 2026-04-02T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56592
published_at 2026-05-07T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56654
published_at 2026-04-04T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-07T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56684
published_at 2026-04-08T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56689
published_at 2026-04-09T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56697
published_at 2026-04-11T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56672
published_at 2026-04-12T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56651
published_at 2026-04-13T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56682
published_at 2026-04-16T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56681
published_at 2026-04-18T12:55:00Z
11
value 0.00338
scoring_system epss
scoring_elements 0.56653
published_at 2026-04-21T12:55:00Z
12
value 0.00338
scoring_system epss
scoring_elements 0.5659
published_at 2026-04-24T12:55:00Z
13
value 0.00338
scoring_system epss
scoring_elements 0.56608
published_at 2026-04-26T12:55:00Z
14
value 0.00338
scoring_system epss
scoring_elements 0.56546
published_at 2026-05-05T12:55:00Z
15
value 0.00338
scoring_system epss
scoring_elements 0.56591
published_at 2026-04-29T12:55:00Z
16
value 0.00453
scoring_system epss
scoring_elements 0.63922
published_at 2026-05-14T12:55:00Z
17
value 0.00453
scoring_system epss
scoring_elements 0.63844
published_at 2026-05-11T12:55:00Z
18
value 0.00453
scoring_system epss
scoring_elements 0.6387
published_at 2026-05-12T12:55:00Z
19
value 0.00453
scoring_system epss
scoring_elements 0.63876
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-35161
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35161
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
reference_id 1077141
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
3
reference_url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_id c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-31T17:38:35Z/
url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2024-35161
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jb1b-9gr2-suez
25
url VCID-jdjf-3w9k-xbaw
vulnerability_id VCID-jdjf-3w9k-xbaw
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41752
reference_id
reference_type
scores
0
value 0.00347
scoring_system epss
scoring_elements 0.57356
published_at 2026-05-14T12:55:00Z
1
value 0.00347
scoring_system epss
scoring_elements 0.57298
published_at 2026-04-13T12:55:00Z
2
value 0.00347
scoring_system epss
scoring_elements 0.57321
published_at 2026-04-18T12:55:00Z
3
value 0.00347
scoring_system epss
scoring_elements 0.573
published_at 2026-04-21T12:55:00Z
4
value 0.00347
scoring_system epss
scoring_elements 0.57257
published_at 2026-04-24T12:55:00Z
5
value 0.00347
scoring_system epss
scoring_elements 0.5728
published_at 2026-04-26T12:55:00Z
6
value 0.00347
scoring_system epss
scoring_elements 0.57261
published_at 2026-04-29T12:55:00Z
7
value 0.00347
scoring_system epss
scoring_elements 0.57211
published_at 2026-05-05T12:55:00Z
8
value 0.00347
scoring_system epss
scoring_elements 0.57255
published_at 2026-05-07T12:55:00Z
9
value 0.00347
scoring_system epss
scoring_elements 0.57317
published_at 2026-05-09T12:55:00Z
10
value 0.00347
scoring_system epss
scoring_elements 0.57266
published_at 2026-05-11T12:55:00Z
11
value 0.00347
scoring_system epss
scoring_elements 0.57291
published_at 2026-05-12T12:55:00Z
12
value 0.00347
scoring_system epss
scoring_elements 0.57273
published_at 2026-04-02T12:55:00Z
13
value 0.00347
scoring_system epss
scoring_elements 0.57296
published_at 2026-04-04T12:55:00Z
14
value 0.00347
scoring_system epss
scoring_elements 0.57272
published_at 2026-04-07T12:55:00Z
15
value 0.00347
scoring_system epss
scoring_elements 0.57324
published_at 2026-04-08T12:55:00Z
16
value 0.00347
scoring_system epss
scoring_elements 0.57326
published_at 2026-04-16T12:55:00Z
17
value 0.00347
scoring_system epss
scoring_elements 0.57339
published_at 2026-04-11T12:55:00Z
18
value 0.00347
scoring_system epss
scoring_elements 0.57319
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41752
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054427
reference_id 1054427
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054427
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
reference_id VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-13T19:48:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-41752
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdjf-3w9k-xbaw
26
url VCID-k2ks-3t6e-uqgu
vulnerability_id VCID-k2ks-3t6e-uqgu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1944
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.79153
published_at 2026-05-14T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.79117
published_at 2026-05-12T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78928
published_at 2026-04-01T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-02T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78961
published_at 2026-04-04T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-07T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.7897
published_at 2026-04-08T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-09T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-21T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78984
published_at 2026-04-12T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-13T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.79002
published_at 2026-04-16T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.79029
published_at 2026-04-24T12:55:00Z
13
value 0.01208
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-26T12:55:00Z
14
value 0.01208
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-29T12:55:00Z
15
value 0.01208
scoring_system epss
scoring_elements 0.79067
published_at 2026-05-05T12:55:00Z
16
value 0.01208
scoring_system epss
scoring_elements 0.79087
published_at 2026-05-07T12:55:00Z
17
value 0.01208
scoring_system epss
scoring_elements 0.79104
published_at 2026-05-09T12:55:00Z
18
value 0.01208
scoring_system epss
scoring_elements 0.79101
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1944
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1944
reference_id CVE-2020-1944
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-1944
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-1944
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ks-3t6e-uqgu
27
url VCID-n66u-b73u-zucb
vulnerability_id VCID-n66u-b73u-zucb
summary
golang.org/x/net/http vulnerable to a reset flood
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

### Specific Go Packages Affected
golang.org/x/net/http2
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
7
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2594
8
reference_url https://access.redhat.com/errata/RHSA-2019:2661
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2661
9
reference_url https://access.redhat.com/errata/RHSA-2019:2682
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2682
10
reference_url https://access.redhat.com/errata/RHSA-2019:2690
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2690
11
reference_url https://access.redhat.com/errata/RHSA-2019:2726
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2726
12
reference_url https://access.redhat.com/errata/RHSA-2019:2766
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2766
13
reference_url https://access.redhat.com/errata/RHSA-2019:2769
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2769
14
reference_url https://access.redhat.com/errata/RHSA-2019:2796
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2796
15
reference_url https://access.redhat.com/errata/RHSA-2019:2861
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2861
16
reference_url https://access.redhat.com/errata/RHSA-2019:2925
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2925
17
reference_url https://access.redhat.com/errata/RHSA-2019:2939
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2939
18
reference_url https://access.redhat.com/errata/RHSA-2019:2955
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2955
19
reference_url https://access.redhat.com/errata/RHSA-2019:2966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2966
20
reference_url https://access.redhat.com/errata/RHSA-2019:3131
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3131
21
reference_url https://access.redhat.com/errata/RHSA-2019:3245
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3245
22
reference_url https://access.redhat.com/errata/RHSA-2019:3265
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3265
23
reference_url https://access.redhat.com/errata/RHSA-2019:3892
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3892
24
reference_url https://access.redhat.com/errata/RHSA-2019:3906
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3906
25
reference_url https://access.redhat.com/errata/RHSA-2019:4018
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4018
26
reference_url https://access.redhat.com/errata/RHSA-2019:4019
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4019
27
reference_url https://access.redhat.com/errata/RHSA-2019:4020
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4020
28
reference_url https://access.redhat.com/errata/RHSA-2019:4021
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4021
29
reference_url https://access.redhat.com/errata/RHSA-2019:4040
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4040
30
reference_url https://access.redhat.com/errata/RHSA-2019:4041
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4041
31
reference_url https://access.redhat.com/errata/RHSA-2019:4042
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4042
32
reference_url https://access.redhat.com/errata/RHSA-2019:4045
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4045
33
reference_url https://access.redhat.com/errata/RHSA-2019:4269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4269
34
reference_url https://access.redhat.com/errata/RHSA-2019:4273
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4273
35
reference_url https://access.redhat.com/errata/RHSA-2019:4352
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4352
36
reference_url https://access.redhat.com/errata/RHSA-2020:0406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0406
37
reference_url https://access.redhat.com/errata/RHSA-2020:0727
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0727
38
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9514.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9514.json
39
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9514
reference_id
reference_type
scores
0
value 0.09483
scoring_system epss
scoring_elements 0.92914
published_at 2026-05-14T12:55:00Z
1
value 0.09483
scoring_system epss
scoring_elements 0.92799
published_at 2026-04-01T12:55:00Z
2
value 0.09483
scoring_system epss
scoring_elements 0.92806
published_at 2026-04-02T12:55:00Z
3
value 0.09483
scoring_system epss
scoring_elements 0.9281
published_at 2026-04-04T12:55:00Z
4
value 0.09483
scoring_system epss
scoring_elements 0.92809
published_at 2026-04-07T12:55:00Z
5
value 0.09483
scoring_system epss
scoring_elements 0.92818
published_at 2026-04-08T12:55:00Z
6
value 0.09483
scoring_system epss
scoring_elements 0.92822
published_at 2026-04-09T12:55:00Z
7
value 0.09483
scoring_system epss
scoring_elements 0.92826
published_at 2026-04-13T12:55:00Z
8
value 0.09483
scoring_system epss
scoring_elements 0.92825
published_at 2026-04-12T12:55:00Z
9
value 0.09483
scoring_system epss
scoring_elements 0.92836
published_at 2026-04-16T12:55:00Z
10
value 0.09483
scoring_system epss
scoring_elements 0.92837
published_at 2026-04-18T12:55:00Z
11
value 0.09483
scoring_system epss
scoring_elements 0.92841
published_at 2026-04-21T12:55:00Z
12
value 0.09483
scoring_system epss
scoring_elements 0.92848
published_at 2026-04-24T12:55:00Z
13
value 0.09483
scoring_system epss
scoring_elements 0.9285
published_at 2026-04-26T12:55:00Z
14
value 0.09483
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-29T12:55:00Z
15
value 0.09483
scoring_system epss
scoring_elements 0.92853
published_at 2026-05-05T12:55:00Z
16
value 0.09483
scoring_system epss
scoring_elements 0.92867
published_at 2026-05-07T12:55:00Z
17
value 0.09483
scoring_system epss
scoring_elements 0.92878
published_at 2026-05-09T12:55:00Z
18
value 0.09483
scoring_system epss
scoring_elements 0.92882
published_at 2026-05-11T12:55:00Z
19
value 0.09483
scoring_system epss
scoring_elements 0.92889
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9514
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
51
reference_url http://seclists.org/fulldisclosure/2019/Aug/16
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2019/Aug/16
52
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
53
reference_url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
54
reference_url https://go.dev/cl/190137
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/190137
55
reference_url https://go.dev/issue/33606
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/33606
56
reference_url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
57
reference_url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
58
reference_url https://kb.cert.org/vuls/id/605641
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kb.cert.org/vuls/id/605641
59
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
60
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
61
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
62
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
63
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
64
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
65
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
66
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
67
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9514
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-9514
69
reference_url https://pkg.go.dev/vuln/GO-2022-0536
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0536
70
reference_url https://seclists.org/bugtraq/2019/Aug/24
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/24
71
reference_url https://seclists.org/bugtraq/2019/Aug/31
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/31
72
reference_url https://seclists.org/bugtraq/2019/Aug/43
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/43
73
reference_url https://seclists.org/bugtraq/2019/Sep/18
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Sep/18
74
reference_url https://security.netapp.com/advisory/ntap-20190823-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0001
75
reference_url https://security.netapp.com/advisory/ntap-20190823-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0004
76
reference_url https://security.netapp.com/advisory/ntap-20190823-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0005
77
reference_url https://support.f5.com/csp/article/K01988340
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K01988340
78
reference_url https://support.f5.com/csp/article/K01988340?utm_source=f5support&utm_medium=RSS
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K01988340?utm_source=f5support&utm_medium=RSS
79
reference_url https://usn.ubuntu.com/4308-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4308-1
80
reference_url https://www.debian.org/security/2019/dsa-4503
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4503
81
reference_url https://www.debian.org/security/2019/dsa-4508
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4508
82
reference_url https://www.debian.org/security/2019/dsa-4520
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4520
83
reference_url https://www.debian.org/security/2020/dsa-4669
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2020/dsa-4669
84
reference_url https://www.synology.com/security/advisory/Synology_SA_19_33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.synology.com/security/advisory/Synology_SA_19_33
85
reference_url http://www.openwall.com/lists/oss-security/2019/08/20/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/08/20/1
86
reference_url http://www.openwall.com/lists/oss-security/2023/10/18/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2023/10/18/8
87
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062667
reference_id 1062667
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062667
88
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735744
reference_id 1735744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735744
89
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885
reference_id 934885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885
90
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
91
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
92
reference_url https://security.archlinux.org/ASA-201908-15
reference_id ASA-201908-15
reference_type
scores
url https://security.archlinux.org/ASA-201908-15
93
reference_url https://security.archlinux.org/AVG-1021
reference_id AVG-1021
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1021
94
reference_url https://access.redhat.com/errata/RHSA-2019:2817
reference_id RHSA-2019:2817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2817
95
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
96
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
97
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
98
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
99
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
100
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
101
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
102
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
103
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9514, GHSA-39qc-96h7-956f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n66u-b73u-zucb
28
url VCID-p5f7-uu6r-8bez
vulnerability_id VCID-p5f7-uu6r-8bez
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31780
reference_id
reference_type
scores
0
value 0.04835
scoring_system epss
scoring_elements 0.8953
published_at 2026-04-21T12:55:00Z
1
value 0.04835
scoring_system epss
scoring_elements 0.89545
published_at 2026-04-24T12:55:00Z
2
value 0.04835
scoring_system epss
scoring_elements 0.89549
published_at 2026-04-29T12:55:00Z
3
value 0.04835
scoring_system epss
scoring_elements 0.89557
published_at 2026-05-05T12:55:00Z
4
value 0.04835
scoring_system epss
scoring_elements 0.89575
published_at 2026-05-07T12:55:00Z
5
value 0.04835
scoring_system epss
scoring_elements 0.89589
published_at 2026-05-09T12:55:00Z
6
value 0.04835
scoring_system epss
scoring_elements 0.89585
published_at 2026-05-11T12:55:00Z
7
value 0.04835
scoring_system epss
scoring_elements 0.89595
published_at 2026-05-12T12:55:00Z
8
value 0.04835
scoring_system epss
scoring_elements 0.89616
published_at 2026-05-14T12:55:00Z
9
value 0.07584
scoring_system epss
scoring_elements 0.91812
published_at 2026-04-02T12:55:00Z
10
value 0.07584
scoring_system epss
scoring_elements 0.91861
published_at 2026-04-18T12:55:00Z
11
value 0.07584
scoring_system epss
scoring_elements 0.91817
published_at 2026-04-04T12:55:00Z
12
value 0.07584
scoring_system epss
scoring_elements 0.91825
published_at 2026-04-07T12:55:00Z
13
value 0.07584
scoring_system epss
scoring_elements 0.91838
published_at 2026-04-08T12:55:00Z
14
value 0.07584
scoring_system epss
scoring_elements 0.91844
published_at 2026-04-09T12:55:00Z
15
value 0.07584
scoring_system epss
scoring_elements 0.91848
published_at 2026-04-11T12:55:00Z
16
value 0.07584
scoring_system epss
scoring_elements 0.91849
published_at 2026-04-12T12:55:00Z
17
value 0.07584
scoring_system epss
scoring_elements 0.91845
published_at 2026-04-13T12:55:00Z
18
value 0.07584
scoring_system epss
scoring_elements 0.91865
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31780
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-31780
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5f7-uu6r-8bez
29
url VCID-pxaf-6qxa-77h9
vulnerability_id VCID-pxaf-6qxa-77h9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17508
reference_id
reference_type
scores
0
value 0.02656
scoring_system epss
scoring_elements 0.85704
published_at 2026-04-01T12:55:00Z
1
value 0.02656
scoring_system epss
scoring_elements 0.85716
published_at 2026-04-02T12:55:00Z
2
value 0.02656
scoring_system epss
scoring_elements 0.85735
published_at 2026-04-04T12:55:00Z
3
value 0.02656
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-07T12:55:00Z
4
value 0.02656
scoring_system epss
scoring_elements 0.8576
published_at 2026-04-08T12:55:00Z
5
value 0.02656
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-09T12:55:00Z
6
value 0.02656
scoring_system epss
scoring_elements 0.85786
published_at 2026-04-11T12:55:00Z
7
value 0.02656
scoring_system epss
scoring_elements 0.85783
published_at 2026-04-12T12:55:00Z
8
value 0.02656
scoring_system epss
scoring_elements 0.8578
published_at 2026-04-13T12:55:00Z
9
value 0.02656
scoring_system epss
scoring_elements 0.85798
published_at 2026-04-16T12:55:00Z
10
value 0.02656
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-18T12:55:00Z
11
value 0.02656
scoring_system epss
scoring_elements 0.85795
published_at 2026-04-21T12:55:00Z
12
value 0.02656
scoring_system epss
scoring_elements 0.85819
published_at 2026-04-24T12:55:00Z
13
value 0.02656
scoring_system epss
scoring_elements 0.85829
published_at 2026-04-26T12:55:00Z
14
value 0.02656
scoring_system epss
scoring_elements 0.8583
published_at 2026-04-29T12:55:00Z
15
value 0.02656
scoring_system epss
scoring_elements 0.85846
published_at 2026-05-05T12:55:00Z
16
value 0.02656
scoring_system epss
scoring_elements 0.85869
published_at 2026-05-07T12:55:00Z
17
value 0.02656
scoring_system epss
scoring_elements 0.85885
published_at 2026-05-09T12:55:00Z
18
value 0.02656
scoring_system epss
scoring_elements 0.85883
published_at 2026-05-11T12:55:00Z
19
value 0.02656
scoring_system epss
scoring_elements 0.85897
published_at 2026-05-12T12:55:00Z
20
value 0.02656
scoring_system epss
scoring_elements 0.85932
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17508
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-17508
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxaf-6qxa-77h9
30
url VCID-rcdg-j23x-xfbn
vulnerability_id VCID-rcdg-j23x-xfbn
summary Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38479
reference_id
reference_type
scores
0
value 0.00574
scoring_system epss
scoring_elements 0.68918
published_at 2026-05-14T12:55:00Z
1
value 0.00574
scoring_system epss
scoring_elements 0.68874
published_at 2026-05-09T12:55:00Z
2
value 0.00574
scoring_system epss
scoring_elements 0.68864
published_at 2026-05-12T12:55:00Z
3
value 0.00574
scoring_system epss
scoring_elements 0.6868
published_at 2026-04-02T12:55:00Z
4
value 0.00574
scoring_system epss
scoring_elements 0.687
published_at 2026-04-04T12:55:00Z
5
value 0.00574
scoring_system epss
scoring_elements 0.68677
published_at 2026-04-07T12:55:00Z
6
value 0.00574
scoring_system epss
scoring_elements 0.68728
published_at 2026-04-08T12:55:00Z
7
value 0.00574
scoring_system epss
scoring_elements 0.68746
published_at 2026-04-09T12:55:00Z
8
value 0.00574
scoring_system epss
scoring_elements 0.68769
published_at 2026-04-11T12:55:00Z
9
value 0.00574
scoring_system epss
scoring_elements 0.68755
published_at 2026-04-12T12:55:00Z
10
value 0.00574
scoring_system epss
scoring_elements 0.68726
published_at 2026-04-13T12:55:00Z
11
value 0.00574
scoring_system epss
scoring_elements 0.68767
published_at 2026-04-16T12:55:00Z
12
value 0.00574
scoring_system epss
scoring_elements 0.68778
published_at 2026-04-18T12:55:00Z
13
value 0.00574
scoring_system epss
scoring_elements 0.68756
published_at 2026-04-21T12:55:00Z
14
value 0.00574
scoring_system epss
scoring_elements 0.68804
published_at 2026-04-24T12:55:00Z
15
value 0.00574
scoring_system epss
scoring_elements 0.6881
published_at 2026-04-26T12:55:00Z
16
value 0.00574
scoring_system epss
scoring_elements 0.68816
published_at 2026-04-29T12:55:00Z
17
value 0.00574
scoring_system epss
scoring_elements 0.68796
published_at 2026-05-05T12:55:00Z
18
value 0.00574
scoring_system epss
scoring_elements 0.68839
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38479
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38479
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531
reference_id 1087531
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531
3
reference_url https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
reference_id y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:51:08Z/
url https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2024-38479
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcdg-j23x-xfbn
31
url VCID-rw58-bnwt-2bam
vulnerability_id VCID-rw58-bnwt-2bam
summary Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38522
reference_id
reference_type
scores
0
value 0.00364
scoring_system epss
scoring_elements 0.58458
published_at 2026-04-02T12:55:00Z
1
value 0.00364
scoring_system epss
scoring_elements 0.58521
published_at 2026-04-18T12:55:00Z
2
value 0.00364
scoring_system epss
scoring_elements 0.585
published_at 2026-04-21T12:55:00Z
3
value 0.00364
scoring_system epss
scoring_elements 0.58465
published_at 2026-04-29T12:55:00Z
4
value 0.00364
scoring_system epss
scoring_elements 0.58478
published_at 2026-04-26T12:55:00Z
5
value 0.00364
scoring_system epss
scoring_elements 0.5843
published_at 2026-05-05T12:55:00Z
6
value 0.00364
scoring_system epss
scoring_elements 0.58473
published_at 2026-05-07T12:55:00Z
7
value 0.00364
scoring_system epss
scoring_elements 0.58477
published_at 2026-04-04T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58448
published_at 2026-04-07T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58501
published_at 2026-04-08T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58507
published_at 2026-04-09T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.58524
published_at 2026-04-11T12:55:00Z
12
value 0.00364
scoring_system epss
scoring_elements 0.58504
published_at 2026-04-12T12:55:00Z
13
value 0.00364
scoring_system epss
scoring_elements 0.58485
published_at 2026-04-13T12:55:00Z
14
value 0.00364
scoring_system epss
scoring_elements 0.58517
published_at 2026-04-16T12:55:00Z
15
value 0.00488
scoring_system epss
scoring_elements 0.65584
published_at 2026-05-12T12:55:00Z
16
value 0.00488
scoring_system epss
scoring_elements 0.65642
published_at 2026-05-14T12:55:00Z
17
value 0.00488
scoring_system epss
scoring_elements 0.65594
published_at 2026-05-09T12:55:00Z
18
value 0.00488
scoring_system epss
scoring_elements 0.65564
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38522
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38522
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
reference_id 1077141
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141
3
reference_url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_id c4mcmpblgl8kkmyt56t23543gp8v56m0
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T13:37:29Z/
url https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0
fixed_packages
0
url pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
purl pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3
aliases CVE-2023-38522
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rw58-bnwt-2bam
32
url VCID-skrs-cynm-r7du
vulnerability_id VCID-skrs-cynm-r7du
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-33933
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33635
published_at 2026-04-04T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33602
published_at 2026-04-02T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33551
published_at 2026-04-09T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33517
published_at 2026-04-08T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33473
published_at 2026-04-07T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.34609
published_at 2026-05-14T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35023
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34976
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.34746
published_at 2026-04-24T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34727
published_at 2026-04-26T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.34637
published_at 2026-04-29T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.34507
published_at 2026-05-05T12:55:00Z
12
value 0.00146
scoring_system epss
scoring_elements 0.34579
published_at 2026-05-07T12:55:00Z
13
value 0.00146
scoring_system epss
scoring_elements 0.34617
published_at 2026-05-09T12:55:00Z
14
value 0.00146
scoring_system epss
scoring_elements 0.34514
published_at 2026-05-11T12:55:00Z
15
value 0.00146
scoring_system epss
scoring_elements 0.3454
published_at 2026-05-12T12:55:00Z
16
value 0.00146
scoring_system epss
scoring_elements 0.35058
published_at 2026-04-11T12:55:00Z
17
value 0.00146
scoring_system epss
scoring_elements 0.35022
published_at 2026-04-12T12:55:00Z
18
value 0.00146
scoring_system epss
scoring_elements 0.34999
published_at 2026-04-13T12:55:00Z
19
value 0.00146
scoring_system epss
scoring_elements 0.35038
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-33933
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
reference_id 1038248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
reference_id 6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
6
reference_url https://www.debian.org/security/2023/dsa-5435
reference_id dsa-5435
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://www.debian.org/security/2023/dsa-5435
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
reference_id FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
8
reference_url https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html
reference_id msg00037.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html
9
reference_url https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
reference_id tns2b4khyyncgs5v5p9y35pobg9z2bvs
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/
url https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-33933
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skrs-cynm-r7du
33
url VCID-t559-a5u6-4ke1
vulnerability_id VCID-t559-a5u6-4ke1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37147
reference_id
reference_type
scores
0
value 0.00656
scoring_system epss
scoring_elements 0.70964
published_at 2026-04-01T12:55:00Z
1
value 0.00656
scoring_system epss
scoring_elements 0.70973
published_at 2026-04-02T12:55:00Z
2
value 0.00656
scoring_system epss
scoring_elements 0.70991
published_at 2026-04-04T12:55:00Z
3
value 0.00656
scoring_system epss
scoring_elements 0.70966
published_at 2026-04-07T12:55:00Z
4
value 0.00656
scoring_system epss
scoring_elements 0.71008
published_at 2026-04-08T12:55:00Z
5
value 0.00656
scoring_system epss
scoring_elements 0.71023
published_at 2026-04-09T12:55:00Z
6
value 0.00656
scoring_system epss
scoring_elements 0.71045
published_at 2026-04-11T12:55:00Z
7
value 0.00656
scoring_system epss
scoring_elements 0.7103
published_at 2026-04-12T12:55:00Z
8
value 0.00656
scoring_system epss
scoring_elements 0.71013
published_at 2026-04-13T12:55:00Z
9
value 0.00656
scoring_system epss
scoring_elements 0.71059
published_at 2026-04-16T12:55:00Z
10
value 0.00656
scoring_system epss
scoring_elements 0.71066
published_at 2026-04-18T12:55:00Z
11
value 0.00656
scoring_system epss
scoring_elements 0.71046
published_at 2026-04-21T12:55:00Z
12
value 0.00656
scoring_system epss
scoring_elements 0.71101
published_at 2026-04-24T12:55:00Z
13
value 0.00656
scoring_system epss
scoring_elements 0.7111
published_at 2026-04-26T12:55:00Z
14
value 0.00656
scoring_system epss
scoring_elements 0.71115
published_at 2026-04-29T12:55:00Z
15
value 0.0089
scoring_system epss
scoring_elements 0.75613
published_at 2026-05-05T12:55:00Z
16
value 0.0089
scoring_system epss
scoring_elements 0.75643
published_at 2026-05-07T12:55:00Z
17
value 0.0089
scoring_system epss
scoring_elements 0.75668
published_at 2026-05-09T12:55:00Z
18
value 0.0089
scoring_system epss
scoring_elements 0.75653
published_at 2026-05-11T12:55:00Z
19
value 0.0089
scoring_system epss
scoring_elements 0.7567
published_at 2026-05-12T12:55:00Z
20
value 0.0089
scoring_system epss
scoring_elements 0.75725
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37147
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t559-a5u6-4ke1
34
url VCID-u5qg-vszr-9ye2
vulnerability_id VCID-u5qg-vszr-9ye2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47185
reference_id
reference_type
scores
0
value 0.00364
scoring_system epss
scoring_elements 0.5845
published_at 2026-04-02T12:55:00Z
1
value 0.00364
scoring_system epss
scoring_elements 0.58469
published_at 2026-04-04T12:55:00Z
2
value 0.00364
scoring_system epss
scoring_elements 0.58443
published_at 2026-04-07T12:55:00Z
3
value 0.00364
scoring_system epss
scoring_elements 0.58495
published_at 2026-04-08T12:55:00Z
4
value 0.00364
scoring_system epss
scoring_elements 0.58502
published_at 2026-04-09T12:55:00Z
5
value 0.00364
scoring_system epss
scoring_elements 0.58519
published_at 2026-04-11T12:55:00Z
6
value 0.00364
scoring_system epss
scoring_elements 0.58499
published_at 2026-04-12T12:55:00Z
7
value 0.00364
scoring_system epss
scoring_elements 0.58479
published_at 2026-04-13T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58511
published_at 2026-04-16T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.58516
published_at 2026-04-18T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58494
published_at 2026-04-21T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.58461
published_at 2026-04-24T12:55:00Z
12
value 0.00364
scoring_system epss
scoring_elements 0.58473
published_at 2026-04-26T12:55:00Z
13
value 0.00364
scoring_system epss
scoring_elements 0.5846
published_at 2026-04-29T12:55:00Z
14
value 0.00524
scoring_system epss
scoring_elements 0.67081
published_at 2026-05-12T12:55:00Z
15
value 0.00524
scoring_system epss
scoring_elements 0.67145
published_at 2026-05-14T12:55:00Z
16
value 0.00524
scoring_system epss
scoring_elements 0.67006
published_at 2026-05-05T12:55:00Z
17
value 0.00524
scoring_system epss
scoring_elements 0.67048
published_at 2026-05-07T12:55:00Z
18
value 0.00524
scoring_system epss
scoring_elements 0.67087
published_at 2026-05-09T12:55:00Z
19
value 0.00524
scoring_system epss
scoring_elements 0.67059
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47185
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430
reference_id 1043430
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/
reference_id BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/
6
reference_url https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
reference_id jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/
url https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc
7
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html
reference_id msg00042.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-47185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u5qg-vszr-9ye2
35
url VCID-uhqf-tsxe-ayc2
vulnerability_id VCID-uhqf-tsxe-ayc2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37149
reference_id
reference_type
scores
0
value 0.01007
scoring_system epss
scoring_elements 0.76995
published_at 2026-04-01T12:55:00Z
1
value 0.01007
scoring_system epss
scoring_elements 0.77001
published_at 2026-04-02T12:55:00Z
2
value 0.01007
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-04T12:55:00Z
3
value 0.01007
scoring_system epss
scoring_elements 0.77011
published_at 2026-04-07T12:55:00Z
4
value 0.01007
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-08T12:55:00Z
5
value 0.01007
scoring_system epss
scoring_elements 0.77053
published_at 2026-04-09T12:55:00Z
6
value 0.01007
scoring_system epss
scoring_elements 0.77082
published_at 2026-04-11T12:55:00Z
7
value 0.01007
scoring_system epss
scoring_elements 0.77061
published_at 2026-04-12T12:55:00Z
8
value 0.01007
scoring_system epss
scoring_elements 0.77056
published_at 2026-04-13T12:55:00Z
9
value 0.01007
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-16T12:55:00Z
10
value 0.01007
scoring_system epss
scoring_elements 0.77099
published_at 2026-04-18T12:55:00Z
11
value 0.01007
scoring_system epss
scoring_elements 0.7709
published_at 2026-04-21T12:55:00Z
12
value 0.01007
scoring_system epss
scoring_elements 0.77125
published_at 2026-04-24T12:55:00Z
13
value 0.01007
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-26T12:55:00Z
14
value 0.01007
scoring_system epss
scoring_elements 0.77146
published_at 2026-04-29T12:55:00Z
15
value 0.01363
scoring_system epss
scoring_elements 0.80274
published_at 2026-05-05T12:55:00Z
16
value 0.01363
scoring_system epss
scoring_elements 0.80297
published_at 2026-05-07T12:55:00Z
17
value 0.01363
scoring_system epss
scoring_elements 0.80313
published_at 2026-05-09T12:55:00Z
18
value 0.01363
scoring_system epss
scoring_elements 0.80309
published_at 2026-05-11T12:55:00Z
19
value 0.01363
scoring_system epss
scoring_elements 0.80326
published_at 2026-05-12T12:55:00Z
20
value 0.01363
scoring_system epss
scoring_elements 0.80367
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37149
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37149
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhqf-tsxe-ayc2
36
url VCID-uhxq-9bzs-u3fd
vulnerability_id VCID-uhxq-9bzs-u3fd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35474
reference_id
reference_type
scores
0
value 0.09211
scoring_system epss
scoring_elements 0.92679
published_at 2026-04-01T12:55:00Z
1
value 0.09211
scoring_system epss
scoring_elements 0.92686
published_at 2026-04-02T12:55:00Z
2
value 0.09211
scoring_system epss
scoring_elements 0.92693
published_at 2026-04-04T12:55:00Z
3
value 0.09211
scoring_system epss
scoring_elements 0.92691
published_at 2026-04-07T12:55:00Z
4
value 0.09211
scoring_system epss
scoring_elements 0.92702
published_at 2026-04-08T12:55:00Z
5
value 0.09211
scoring_system epss
scoring_elements 0.92706
published_at 2026-04-09T12:55:00Z
6
value 0.09211
scoring_system epss
scoring_elements 0.92712
published_at 2026-04-12T12:55:00Z
7
value 0.09211
scoring_system epss
scoring_elements 0.9271
published_at 2026-04-13T12:55:00Z
8
value 0.09211
scoring_system epss
scoring_elements 0.92722
published_at 2026-04-18T12:55:00Z
9
value 0.09211
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-21T12:55:00Z
10
value 0.09211
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-26T12:55:00Z
11
value 0.09211
scoring_system epss
scoring_elements 0.92725
published_at 2026-04-29T12:55:00Z
12
value 0.09211
scoring_system epss
scoring_elements 0.92733
published_at 2026-05-05T12:55:00Z
13
value 0.09211
scoring_system epss
scoring_elements 0.92747
published_at 2026-05-07T12:55:00Z
14
value 0.09211
scoring_system epss
scoring_elements 0.92759
published_at 2026-05-09T12:55:00Z
15
value 0.09211
scoring_system epss
scoring_elements 0.92762
published_at 2026-05-11T12:55:00Z
16
value 0.09211
scoring_system epss
scoring_elements 0.92767
published_at 2026-05-12T12:55:00Z
17
value 0.09211
scoring_system epss
scoring_elements 0.92792
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-35474
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhxq-9bzs-u3fd
37
url VCID-uy1m-av2n-jybt
vulnerability_id VCID-uy1m-av2n-jybt
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30631
reference_id
reference_type
scores
0
value 0.0062
scoring_system epss
scoring_elements 0.69986
published_at 2026-04-02T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.7
published_at 2026-04-04T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.69977
published_at 2026-04-07T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.70025
published_at 2026-04-08T12:55:00Z
4
value 0.0062
scoring_system epss
scoring_elements 0.70041
published_at 2026-04-09T12:55:00Z
5
value 0.00662
scoring_system epss
scoring_elements 0.71179
published_at 2026-04-21T12:55:00Z
6
value 0.00662
scoring_system epss
scoring_elements 0.71165
published_at 2026-04-12T12:55:00Z
7
value 0.00662
scoring_system epss
scoring_elements 0.71148
published_at 2026-04-13T12:55:00Z
8
value 0.00662
scoring_system epss
scoring_elements 0.71194
published_at 2026-04-16T12:55:00Z
9
value 0.00662
scoring_system epss
scoring_elements 0.71201
published_at 2026-04-18T12:55:00Z
10
value 0.00662
scoring_system epss
scoring_elements 0.71233
published_at 2026-04-24T12:55:00Z
11
value 0.00662
scoring_system epss
scoring_elements 0.71241
published_at 2026-04-26T12:55:00Z
12
value 0.00662
scoring_system epss
scoring_elements 0.71244
published_at 2026-04-29T12:55:00Z
13
value 0.00662
scoring_system epss
scoring_elements 0.71226
published_at 2026-05-05T12:55:00Z
14
value 0.00662
scoring_system epss
scoring_elements 0.71264
published_at 2026-05-07T12:55:00Z
15
value 0.00662
scoring_system epss
scoring_elements 0.71298
published_at 2026-05-09T12:55:00Z
16
value 0.00662
scoring_system epss
scoring_elements 0.71261
published_at 2026-05-11T12:55:00Z
17
value 0.00662
scoring_system epss
scoring_elements 0.71289
published_at 2026-05-12T12:55:00Z
18
value 0.00662
scoring_system epss
scoring_elements 0.71345
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30631
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
reference_id 1038248
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2023-30631
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uy1m-av2n-jybt
38
url VCID-w42s-4aps-y3c5
vulnerability_id VCID-w42s-4aps-y3c5
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38161
reference_id
reference_type
scores
0
value 0.01167
scoring_system epss
scoring_elements 0.78586
published_at 2026-04-01T12:55:00Z
1
value 0.01167
scoring_system epss
scoring_elements 0.78593
published_at 2026-04-02T12:55:00Z
2
value 0.01167
scoring_system epss
scoring_elements 0.78624
published_at 2026-04-04T12:55:00Z
3
value 0.01167
scoring_system epss
scoring_elements 0.78605
published_at 2026-04-07T12:55:00Z
4
value 0.01167
scoring_system epss
scoring_elements 0.7863
published_at 2026-04-08T12:55:00Z
5
value 0.01167
scoring_system epss
scoring_elements 0.78637
published_at 2026-04-09T12:55:00Z
6
value 0.01167
scoring_system epss
scoring_elements 0.78662
published_at 2026-04-11T12:55:00Z
7
value 0.01167
scoring_system epss
scoring_elements 0.78643
published_at 2026-04-12T12:55:00Z
8
value 0.01167
scoring_system epss
scoring_elements 0.78636
published_at 2026-04-13T12:55:00Z
9
value 0.01167
scoring_system epss
scoring_elements 0.78665
published_at 2026-04-16T12:55:00Z
10
value 0.01167
scoring_system epss
scoring_elements 0.78663
published_at 2026-04-18T12:55:00Z
11
value 0.01167
scoring_system epss
scoring_elements 0.7866
published_at 2026-04-21T12:55:00Z
12
value 0.01167
scoring_system epss
scoring_elements 0.7869
published_at 2026-04-24T12:55:00Z
13
value 0.01167
scoring_system epss
scoring_elements 0.78698
published_at 2026-04-26T12:55:00Z
14
value 0.01167
scoring_system epss
scoring_elements 0.78715
published_at 2026-04-29T12:55:00Z
15
value 0.01167
scoring_system epss
scoring_elements 0.78736
published_at 2026-05-05T12:55:00Z
16
value 0.01167
scoring_system epss
scoring_elements 0.78759
published_at 2026-05-07T12:55:00Z
17
value 0.01167
scoring_system epss
scoring_elements 0.78775
published_at 2026-05-09T12:55:00Z
18
value 0.01167
scoring_system epss
scoring_elements 0.78772
published_at 2026-05-11T12:55:00Z
19
value 0.01167
scoring_system epss
scoring_elements 0.78788
published_at 2026-05-12T12:55:00Z
20
value 0.01167
scoring_system epss
scoring_elements 0.78827
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38161
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-38161
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w42s-4aps-y3c5
39
url VCID-waer-as81-8fed
vulnerability_id VCID-waer-as81-8fed
summary trafficserver: CONTINUATION frames DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31309.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31309
reference_id
reference_type
scores
0
value 0.02839
scoring_system epss
scoring_elements 0.86155
published_at 2026-04-07T12:55:00Z
1
value 0.02839
scoring_system epss
scoring_elements 0.86139
published_at 2026-04-02T12:55:00Z
2
value 0.02839
scoring_system epss
scoring_elements 0.86174
published_at 2026-04-08T12:55:00Z
3
value 0.03661
scoring_system epss
scoring_elements 0.87905
published_at 2026-04-16T12:55:00Z
4
value 0.03661
scoring_system epss
scoring_elements 0.87891
published_at 2026-04-13T12:55:00Z
5
value 0.03661
scoring_system epss
scoring_elements 0.87892
published_at 2026-04-12T12:55:00Z
6
value 0.03661
scoring_system epss
scoring_elements 0.87898
published_at 2026-04-11T12:55:00Z
7
value 0.03661
scoring_system epss
scoring_elements 0.87887
published_at 2026-04-09T12:55:00Z
8
value 0.10847
scoring_system epss
scoring_elements 0.93404
published_at 2026-04-24T12:55:00Z
9
value 0.10847
scoring_system epss
scoring_elements 0.93435
published_at 2026-05-12T12:55:00Z
10
value 0.10847
scoring_system epss
scoring_elements 0.93394
published_at 2026-04-18T12:55:00Z
11
value 0.10847
scoring_system epss
scoring_elements 0.93428
published_at 2026-05-11T12:55:00Z
12
value 0.10847
scoring_system epss
scoring_elements 0.93417
published_at 2026-05-07T12:55:00Z
13
value 0.10847
scoring_system epss
scoring_elements 0.93405
published_at 2026-05-05T12:55:00Z
14
value 0.10847
scoring_system epss
scoring_elements 0.93399
published_at 2026-04-29T12:55:00Z
15
value 0.10847
scoring_system epss
scoring_elements 0.93448
published_at 2026-05-14T12:55:00Z
16
value 0.10847
scoring_system epss
scoring_elements 0.934
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31309
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068417
reference_id 1068417
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068417
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269627
reference_id 2269627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2269627
5
reference_url http://www.openwall.com/lists/oss-security/2024/04/10/7
reference_id 7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url http://www.openwall.com/lists/oss-security/2024/04/10/7
6
reference_url https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc
reference_id f9qh3g3jvy153wh82pz4onrfj1wh13kc
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc
7
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/
reference_id PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/
reference_id QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/
reference_id T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2024-31309
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-waer-as81-8fed
40
url VCID-xh97-4sn5-vyfw
vulnerability_id VCID-xh97-4sn5-vyfw
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32567
reference_id
reference_type
scores
0
value 0.07927
scoring_system epss
scoring_elements 0.92013
published_at 2026-04-01T12:55:00Z
1
value 0.07927
scoring_system epss
scoring_elements 0.92019
published_at 2026-04-02T12:55:00Z
2
value 0.07927
scoring_system epss
scoring_elements 0.92027
published_at 2026-04-04T12:55:00Z
3
value 0.07927
scoring_system epss
scoring_elements 0.92032
published_at 2026-04-07T12:55:00Z
4
value 0.07927
scoring_system epss
scoring_elements 0.92044
published_at 2026-04-08T12:55:00Z
5
value 0.07927
scoring_system epss
scoring_elements 0.92047
published_at 2026-04-09T12:55:00Z
6
value 0.07927
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-12T12:55:00Z
7
value 0.07927
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-13T12:55:00Z
8
value 0.07927
scoring_system epss
scoring_elements 0.92066
published_at 2026-04-24T12:55:00Z
9
value 0.07927
scoring_system epss
scoring_elements 0.92063
published_at 2026-04-18T12:55:00Z
10
value 0.07927
scoring_system epss
scoring_elements 0.92061
published_at 2026-04-21T12:55:00Z
11
value 0.07927
scoring_system epss
scoring_elements 0.92064
published_at 2026-04-26T12:55:00Z
12
value 0.07927
scoring_system epss
scoring_elements 0.9206
published_at 2026-04-29T12:55:00Z
13
value 0.07927
scoring_system epss
scoring_elements 0.92072
published_at 2026-05-05T12:55:00Z
14
value 0.07927
scoring_system epss
scoring_elements 0.92085
published_at 2026-05-07T12:55:00Z
15
value 0.07927
scoring_system epss
scoring_elements 0.92093
published_at 2026-05-11T12:55:00Z
16
value 0.07927
scoring_system epss
scoring_elements 0.921
published_at 2026-05-12T12:55:00Z
17
value 0.07927
scoring_system epss
scoring_elements 0.9212
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32567
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32567
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xh97-4sn5-vyfw
41
url VCID-xwdc-hndy-yubc
vulnerability_id VCID-xwdc-hndy-yubc
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9494
reference_id
reference_type
scores
0
value 0.03178
scoring_system epss
scoring_elements 0.87097
published_at 2026-05-14T12:55:00Z
1
value 0.03178
scoring_system epss
scoring_elements 0.86918
published_at 2026-04-02T12:55:00Z
2
value 0.03178
scoring_system epss
scoring_elements 0.86937
published_at 2026-04-04T12:55:00Z
3
value 0.03178
scoring_system epss
scoring_elements 0.8693
published_at 2026-04-07T12:55:00Z
4
value 0.03178
scoring_system epss
scoring_elements 0.8695
published_at 2026-04-08T12:55:00Z
5
value 0.03178
scoring_system epss
scoring_elements 0.86957
published_at 2026-04-09T12:55:00Z
6
value 0.03178
scoring_system epss
scoring_elements 0.86971
published_at 2026-04-11T12:55:00Z
7
value 0.03178
scoring_system epss
scoring_elements 0.86966
published_at 2026-04-12T12:55:00Z
8
value 0.03178
scoring_system epss
scoring_elements 0.8696
published_at 2026-04-13T12:55:00Z
9
value 0.03178
scoring_system epss
scoring_elements 0.86975
published_at 2026-04-16T12:55:00Z
10
value 0.03178
scoring_system epss
scoring_elements 0.86979
published_at 2026-04-18T12:55:00Z
11
value 0.03178
scoring_system epss
scoring_elements 0.86978
published_at 2026-04-21T12:55:00Z
12
value 0.03178
scoring_system epss
scoring_elements 0.87056
published_at 2026-05-09T12:55:00Z
13
value 0.03178
scoring_system epss
scoring_elements 0.87052
published_at 2026-05-11T12:55:00Z
14
value 0.03178
scoring_system epss
scoring_elements 0.87066
published_at 2026-05-12T12:55:00Z
15
value 0.03178
scoring_system epss
scoring_elements 0.86907
published_at 2026-04-01T12:55:00Z
16
value 0.03178
scoring_system epss
scoring_elements 0.87039
published_at 2026-05-07T12:55:00Z
17
value 0.03451
scoring_system epss
scoring_elements 0.87545
published_at 2026-04-24T12:55:00Z
18
value 0.03451
scoring_system epss
scoring_elements 0.87551
published_at 2026-04-26T12:55:00Z
19
value 0.03451
scoring_system epss
scoring_elements 0.8755
published_at 2026-04-29T12:55:00Z
20
value 0.03451
scoring_system epss
scoring_elements 0.87563
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9494
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963629
reference_id 963629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963629
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-9494
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwdc-hndy-yubc
42
url VCID-xwru-y5m9-gucd
vulnerability_id VCID-xwru-y5m9-gucd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31779
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44013
published_at 2026-04-02T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44036
published_at 2026-04-04T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72275
published_at 2026-04-07T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.72314
published_at 2026-04-08T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72326
published_at 2026-04-09T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72349
published_at 2026-04-11T12:55:00Z
6
value 0.0345
scoring_system epss
scoring_elements 0.87515
published_at 2026-04-12T12:55:00Z
7
value 0.0345
scoring_system epss
scoring_elements 0.87512
published_at 2026-04-13T12:55:00Z
8
value 0.0345
scoring_system epss
scoring_elements 0.87527
published_at 2026-04-21T12:55:00Z
9
value 0.0345
scoring_system epss
scoring_elements 0.87529
published_at 2026-04-18T12:55:00Z
10
value 0.0345
scoring_system epss
scoring_elements 0.87542
published_at 2026-04-24T12:55:00Z
11
value 0.0345
scoring_system epss
scoring_elements 0.87549
published_at 2026-04-26T12:55:00Z
12
value 0.0345
scoring_system epss
scoring_elements 0.87548
published_at 2026-04-29T12:55:00Z
13
value 0.0345
scoring_system epss
scoring_elements 0.87562
published_at 2026-05-05T12:55:00Z
14
value 0.0345
scoring_system epss
scoring_elements 0.87576
published_at 2026-05-07T12:55:00Z
15
value 0.0345
scoring_system epss
scoring_elements 0.87594
published_at 2026-05-09T12:55:00Z
16
value 0.0345
scoring_system epss
scoring_elements 0.8759
published_at 2026-05-11T12:55:00Z
17
value 0.0345
scoring_system epss
scoring_elements 0.87603
published_at 2026-05-12T12:55:00Z
18
value 0.0345
scoring_system epss
scoring_elements 0.87635
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31779
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2022-31779
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwru-y5m9-gucd
43
url VCID-zmh1-wmct-uyf7
vulnerability_id VCID-zmh1-wmct-uyf7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32565
reference_id
reference_type
scores
0
value 0.05675
scoring_system epss
scoring_elements 0.90351
published_at 2026-04-01T12:55:00Z
1
value 0.05675
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-02T12:55:00Z
2
value 0.05675
scoring_system epss
scoring_elements 0.90365
published_at 2026-04-04T12:55:00Z
3
value 0.05675
scoring_system epss
scoring_elements 0.90369
published_at 2026-04-07T12:55:00Z
4
value 0.05675
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-08T12:55:00Z
5
value 0.05675
scoring_system epss
scoring_elements 0.90389
published_at 2026-04-09T12:55:00Z
6
value 0.05675
scoring_system epss
scoring_elements 0.90397
published_at 2026-04-12T12:55:00Z
7
value 0.05675
scoring_system epss
scoring_elements 0.9039
published_at 2026-04-13T12:55:00Z
8
value 0.05675
scoring_system epss
scoring_elements 0.90406
published_at 2026-04-16T12:55:00Z
9
value 0.05675
scoring_system epss
scoring_elements 0.90405
published_at 2026-04-18T12:55:00Z
10
value 0.05675
scoring_system epss
scoring_elements 0.90403
published_at 2026-04-21T12:55:00Z
11
value 0.05675
scoring_system epss
scoring_elements 0.90417
published_at 2026-04-26T12:55:00Z
12
value 0.05675
scoring_system epss
scoring_elements 0.90413
published_at 2026-04-29T12:55:00Z
13
value 0.05675
scoring_system epss
scoring_elements 0.90427
published_at 2026-05-05T12:55:00Z
14
value 0.05675
scoring_system epss
scoring_elements 0.90444
published_at 2026-05-07T12:55:00Z
15
value 0.05675
scoring_system epss
scoring_elements 0.90456
published_at 2026-05-09T12:55:00Z
16
value 0.05675
scoring_system epss
scoring_elements 0.90453
published_at 2026-05-11T12:55:00Z
17
value 0.05675
scoring_system epss
scoring_elements 0.90462
published_at 2026-05-12T12:55:00Z
18
value 0.05675
scoring_system epss
scoring_elements 0.90475
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32565
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32565
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zmh1-wmct-uyf7
Fixing_vulnerabilities
0
url VCID-568b-s8ks-vfa6
vulnerability_id VCID-568b-s8ks-vfa6
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17565
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.79153
published_at 2026-05-14T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.79117
published_at 2026-05-12T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78928
published_at 2026-04-01T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-02T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78961
published_at 2026-04-04T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-07T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.7897
published_at 2026-04-08T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-09T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-21T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78984
published_at 2026-04-12T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-13T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.79002
published_at 2026-04-16T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.79029
published_at 2026-04-24T12:55:00Z
13
value 0.01208
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-26T12:55:00Z
14
value 0.01208
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-29T12:55:00Z
15
value 0.01208
scoring_system epss
scoring_elements 0.79067
published_at 2026-05-05T12:55:00Z
16
value 0.01208
scoring_system epss
scoring_elements 0.79087
published_at 2026-05-07T12:55:00Z
17
value 0.01208
scoring_system epss
scoring_elements 0.79104
published_at 2026-05-09T12:55:00Z
18
value 0.01208
scoring_system epss
scoring_elements 0.79101
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17565
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17565
reference_id CVE-2019-17565
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17565
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-17565
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-568b-s8ks-vfa6
1
url VCID-6bwv-cd3d-mudb
vulnerability_id VCID-6bwv-cd3d-mudb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17559
reference_id
reference_type
scores
0
value 0.01409
scoring_system epss
scoring_elements 0.80677
published_at 2026-05-14T12:55:00Z
1
value 0.01409
scoring_system epss
scoring_elements 0.80636
published_at 2026-05-12T12:55:00Z
2
value 0.01409
scoring_system epss
scoring_elements 0.80433
published_at 2026-04-01T12:55:00Z
3
value 0.01409
scoring_system epss
scoring_elements 0.80439
published_at 2026-04-02T12:55:00Z
4
value 0.01409
scoring_system epss
scoring_elements 0.8046
published_at 2026-04-04T12:55:00Z
5
value 0.01409
scoring_system epss
scoring_elements 0.80449
published_at 2026-04-07T12:55:00Z
6
value 0.01409
scoring_system epss
scoring_elements 0.80478
published_at 2026-04-08T12:55:00Z
7
value 0.01409
scoring_system epss
scoring_elements 0.80488
published_at 2026-04-09T12:55:00Z
8
value 0.01409
scoring_system epss
scoring_elements 0.80506
published_at 2026-04-11T12:55:00Z
9
value 0.01409
scoring_system epss
scoring_elements 0.80492
published_at 2026-04-12T12:55:00Z
10
value 0.01409
scoring_system epss
scoring_elements 0.80484
published_at 2026-04-13T12:55:00Z
11
value 0.01409
scoring_system epss
scoring_elements 0.80513
published_at 2026-04-16T12:55:00Z
12
value 0.01409
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-18T12:55:00Z
13
value 0.01409
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-21T12:55:00Z
14
value 0.01409
scoring_system epss
scoring_elements 0.80543
published_at 2026-04-24T12:55:00Z
15
value 0.01409
scoring_system epss
scoring_elements 0.80547
published_at 2026-04-26T12:55:00Z
16
value 0.01409
scoring_system epss
scoring_elements 0.80563
published_at 2026-04-29T12:55:00Z
17
value 0.01409
scoring_system epss
scoring_elements 0.80583
published_at 2026-05-05T12:55:00Z
18
value 0.01409
scoring_system epss
scoring_elements 0.80605
published_at 2026-05-07T12:55:00Z
19
value 0.01409
scoring_system epss
scoring_elements 0.80624
published_at 2026-05-09T12:55:00Z
20
value 0.01409
scoring_system epss
scoring_elements 0.80619
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17559
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-17559
reference_id CVE-2019-17559
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-17559
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-17559
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bwv-cd3d-mudb
2
url VCID-931v-ukcc-6qaa
vulnerability_id VCID-931v-ukcc-6qaa
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44040
reference_id
reference_type
scores
0
value 0.0325
scoring_system epss
scoring_elements 0.87067
published_at 2026-04-01T12:55:00Z
1
value 0.0325
scoring_system epss
scoring_elements 0.87078
published_at 2026-04-02T12:55:00Z
2
value 0.0325
scoring_system epss
scoring_elements 0.87096
published_at 2026-04-04T12:55:00Z
3
value 0.0325
scoring_system epss
scoring_elements 0.87089
published_at 2026-04-07T12:55:00Z
4
value 0.0325
scoring_system epss
scoring_elements 0.8711
published_at 2026-04-08T12:55:00Z
5
value 0.0325
scoring_system epss
scoring_elements 0.87117
published_at 2026-04-09T12:55:00Z
6
value 0.0325
scoring_system epss
scoring_elements 0.8713
published_at 2026-04-11T12:55:00Z
7
value 0.0325
scoring_system epss
scoring_elements 0.87125
published_at 2026-04-12T12:55:00Z
8
value 0.0325
scoring_system epss
scoring_elements 0.8712
published_at 2026-04-13T12:55:00Z
9
value 0.0325
scoring_system epss
scoring_elements 0.87136
published_at 2026-04-21T12:55:00Z
10
value 0.0325
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-18T12:55:00Z
11
value 0.0325
scoring_system epss
scoring_elements 0.87156
published_at 2026-04-24T12:55:00Z
12
value 0.0325
scoring_system epss
scoring_elements 0.87162
published_at 2026-04-26T12:55:00Z
13
value 0.0325
scoring_system epss
scoring_elements 0.87163
published_at 2026-04-29T12:55:00Z
14
value 0.0325
scoring_system epss
scoring_elements 0.87183
published_at 2026-05-05T12:55:00Z
15
value 0.0325
scoring_system epss
scoring_elements 0.87199
published_at 2026-05-07T12:55:00Z
16
value 0.0325
scoring_system epss
scoring_elements 0.87217
published_at 2026-05-09T12:55:00Z
17
value 0.0325
scoring_system epss
scoring_elements 0.87212
published_at 2026-05-11T12:55:00Z
18
value 0.0325
scoring_system epss
scoring_elements 0.87228
published_at 2026-05-12T12:55:00Z
19
value 0.0325
scoring_system epss
scoring_elements 0.87263
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-44040
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-931v-ukcc-6qaa
3
url VCID-aqt5-2ffy-9bgs
vulnerability_id VCID-aqt5-2ffy-9bgs
summary HTTP/2: flood using SETTINGS frames results in unbounded memory growth
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9515
reference_id
reference_type
scores
0
value 0.09046
scoring_system epss
scoring_elements 0.9272
published_at 2026-05-14T12:55:00Z
1
value 0.09046
scoring_system epss
scoring_elements 0.92687
published_at 2026-05-09T12:55:00Z
2
value 0.09046
scoring_system epss
scoring_elements 0.9269
published_at 2026-05-11T12:55:00Z
3
value 0.09046
scoring_system epss
scoring_elements 0.92695
published_at 2026-05-12T12:55:00Z
4
value 0.09046
scoring_system epss
scoring_elements 0.92618
published_at 2026-04-07T12:55:00Z
5
value 0.09046
scoring_system epss
scoring_elements 0.92629
published_at 2026-04-08T12:55:00Z
6
value 0.09046
scoring_system epss
scoring_elements 0.92635
published_at 2026-04-09T12:55:00Z
7
value 0.09046
scoring_system epss
scoring_elements 0.92639
published_at 2026-04-13T12:55:00Z
8
value 0.09046
scoring_system epss
scoring_elements 0.9264
published_at 2026-04-12T12:55:00Z
9
value 0.09046
scoring_system epss
scoring_elements 0.92652
published_at 2026-04-18T12:55:00Z
10
value 0.09046
scoring_system epss
scoring_elements 0.92655
published_at 2026-04-21T12:55:00Z
11
value 0.09046
scoring_system epss
scoring_elements 0.92657
published_at 2026-04-24T12:55:00Z
12
value 0.09046
scoring_system epss
scoring_elements 0.92658
published_at 2026-04-26T12:55:00Z
13
value 0.09046
scoring_system epss
scoring_elements 0.92654
published_at 2026-04-29T12:55:00Z
14
value 0.09046
scoring_system epss
scoring_elements 0.92663
published_at 2026-05-05T12:55:00Z
15
value 0.09046
scoring_system epss
scoring_elements 0.92676
published_at 2026-05-07T12:55:00Z
16
value 0.10394
scoring_system epss
scoring_elements 0.93194
published_at 2026-04-02T12:55:00Z
17
value 0.10394
scoring_system epss
scoring_elements 0.93185
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9515
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735745
reference_id 1735745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735745
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
11
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
12
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
13
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
14
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
15
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
16
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
17
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
18
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
19
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9515
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aqt5-2ffy-9bgs
4
url VCID-au6q-ek7r-8bgr
vulnerability_id VCID-au6q-ek7r-8bgr
summary sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11783
reference_id
reference_type
scores
0
value 0.01124
scoring_system epss
scoring_elements 0.78456
published_at 2026-05-14T12:55:00Z
1
value 0.01124
scoring_system epss
scoring_elements 0.78417
published_at 2026-05-12T12:55:00Z
2
value 0.01124
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-01T12:55:00Z
3
value 0.01124
scoring_system epss
scoring_elements 0.78224
published_at 2026-04-02T12:55:00Z
4
value 0.01124
scoring_system epss
scoring_elements 0.78256
published_at 2026-04-04T12:55:00Z
5
value 0.01124
scoring_system epss
scoring_elements 0.78237
published_at 2026-04-07T12:55:00Z
6
value 0.01124
scoring_system epss
scoring_elements 0.78264
published_at 2026-04-08T12:55:00Z
7
value 0.01124
scoring_system epss
scoring_elements 0.7827
published_at 2026-04-09T12:55:00Z
8
value 0.01124
scoring_system epss
scoring_elements 0.78295
published_at 2026-04-11T12:55:00Z
9
value 0.01124
scoring_system epss
scoring_elements 0.78278
published_at 2026-04-12T12:55:00Z
10
value 0.01124
scoring_system epss
scoring_elements 0.78273
published_at 2026-04-13T12:55:00Z
11
value 0.01124
scoring_system epss
scoring_elements 0.78304
published_at 2026-04-16T12:55:00Z
12
value 0.01124
scoring_system epss
scoring_elements 0.78301
published_at 2026-04-18T12:55:00Z
13
value 0.01124
scoring_system epss
scoring_elements 0.78297
published_at 2026-04-21T12:55:00Z
14
value 0.01124
scoring_system epss
scoring_elements 0.78329
published_at 2026-04-24T12:55:00Z
15
value 0.01124
scoring_system epss
scoring_elements 0.78336
published_at 2026-04-26T12:55:00Z
16
value 0.01124
scoring_system epss
scoring_elements 0.78352
published_at 2026-04-29T12:55:00Z
17
value 0.01124
scoring_system epss
scoring_elements 0.78364
published_at 2026-05-05T12:55:00Z
18
value 0.01124
scoring_system epss
scoring_elements 0.78389
published_at 2026-05-07T12:55:00Z
19
value 0.01124
scoring_system epss
scoring_elements 0.78406
published_at 2026-05-09T12:55:00Z
20
value 0.01124
scoring_system epss
scoring_elements 0.78401
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11783
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11783
2
reference_url https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/4f102f943935476732fb1fb653d687c7b69d29d9792f0d6cf72c505e%40%3Cannounce.trafficserver.apache.org%3E
3
reference_url http://www.securityfocus.com/bid/107032
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107032
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11783
reference_id CVE-2018-11783
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-11783
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-11783
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-au6q-ek7r-8bgr
5
url VCID-btm9-vxvc-3qhv
vulnerability_id VCID-btm9-vxvc-3qhv
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10079
reference_id
reference_type
scores
0
value 0.05102
scoring_system epss
scoring_elements 0.89914
published_at 2026-05-14T12:55:00Z
1
value 0.05102
scoring_system epss
scoring_elements 0.89897
published_at 2026-05-12T12:55:00Z
2
value 0.05102
scoring_system epss
scoring_elements 0.8979
published_at 2026-04-01T12:55:00Z
3
value 0.05102
scoring_system epss
scoring_elements 0.89793
published_at 2026-04-02T12:55:00Z
4
value 0.05102
scoring_system epss
scoring_elements 0.89807
published_at 2026-04-04T12:55:00Z
5
value 0.05102
scoring_system epss
scoring_elements 0.89811
published_at 2026-04-07T12:55:00Z
6
value 0.05102
scoring_system epss
scoring_elements 0.89828
published_at 2026-04-08T12:55:00Z
7
value 0.05102
scoring_system epss
scoring_elements 0.89835
published_at 2026-04-09T12:55:00Z
8
value 0.05102
scoring_system epss
scoring_elements 0.89841
published_at 2026-04-11T12:55:00Z
9
value 0.05102
scoring_system epss
scoring_elements 0.89839
published_at 2026-04-12T12:55:00Z
10
value 0.05102
scoring_system epss
scoring_elements 0.89832
published_at 2026-04-13T12:55:00Z
11
value 0.05102
scoring_system epss
scoring_elements 0.89846
published_at 2026-04-18T12:55:00Z
12
value 0.05102
scoring_system epss
scoring_elements 0.8984
published_at 2026-04-21T12:55:00Z
13
value 0.05102
scoring_system epss
scoring_elements 0.89855
published_at 2026-04-26T12:55:00Z
14
value 0.05102
scoring_system epss
scoring_elements 0.89854
published_at 2026-04-29T12:55:00Z
15
value 0.05102
scoring_system epss
scoring_elements 0.89867
published_at 2026-05-05T12:55:00Z
16
value 0.05102
scoring_system epss
scoring_elements 0.89883
published_at 2026-05-07T12:55:00Z
17
value 0.05102
scoring_system epss
scoring_elements 0.89894
published_at 2026-05-09T12:55:00Z
18
value 0.05102
scoring_system epss
scoring_elements 0.89889
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10079
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
6
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10079
reference_id CVE-2019-10079
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10079
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-10079
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btm9-vxvc-3qhv
6
url VCID-c5hc-3jtx-k3a6
vulnerability_id VCID-c5hc-3jtx-k3a6
summary HTTP/2: flood using empty frames results in excessive resource consumption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9518.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9518
reference_id
reference_type
scores
0
value 0.03645
scoring_system epss
scoring_elements 0.87975
published_at 2026-05-14T12:55:00Z
1
value 0.03645
scoring_system epss
scoring_elements 0.87932
published_at 2026-05-09T12:55:00Z
2
value 0.03645
scoring_system epss
scoring_elements 0.87929
published_at 2026-05-11T12:55:00Z
3
value 0.03645
scoring_system epss
scoring_elements 0.87942
published_at 2026-05-12T12:55:00Z
4
value 0.03645
scoring_system epss
scoring_elements 0.87825
published_at 2026-04-04T12:55:00Z
5
value 0.03645
scoring_system epss
scoring_elements 0.87829
published_at 2026-04-07T12:55:00Z
6
value 0.03645
scoring_system epss
scoring_elements 0.8785
published_at 2026-04-08T12:55:00Z
7
value 0.03645
scoring_system epss
scoring_elements 0.87857
published_at 2026-04-09T12:55:00Z
8
value 0.03645
scoring_system epss
scoring_elements 0.87868
published_at 2026-04-11T12:55:00Z
9
value 0.03645
scoring_system epss
scoring_elements 0.87862
published_at 2026-04-12T12:55:00Z
10
value 0.03645
scoring_system epss
scoring_elements 0.8786
published_at 2026-04-13T12:55:00Z
11
value 0.03645
scoring_system epss
scoring_elements 0.87874
published_at 2026-04-16T12:55:00Z
12
value 0.03645
scoring_system epss
scoring_elements 0.87873
published_at 2026-04-18T12:55:00Z
13
value 0.03645
scoring_system epss
scoring_elements 0.8787
published_at 2026-04-21T12:55:00Z
14
value 0.03645
scoring_system epss
scoring_elements 0.87887
published_at 2026-04-24T12:55:00Z
15
value 0.03645
scoring_system epss
scoring_elements 0.87893
published_at 2026-04-26T12:55:00Z
16
value 0.03645
scoring_system epss
scoring_elements 0.8789
published_at 2026-04-29T12:55:00Z
17
value 0.03645
scoring_system epss
scoring_elements 0.87901
published_at 2026-05-05T12:55:00Z
18
value 0.03645
scoring_system epss
scoring_elements 0.87916
published_at 2026-05-07T12:55:00Z
19
value 0.04696
scoring_system epss
scoring_elements 0.89316
published_at 2026-04-02T12:55:00Z
20
value 0.04696
scoring_system epss
scoring_elements 0.89311
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735749
reference_id 1735749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735749
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935314
reference_id 935314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935314
10
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
11
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
12
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
13
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
14
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
15
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9518
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c5hc-3jtx-k3a6
7
url VCID-c675-5njd-63hk
vulnerability_id VCID-c675-5njd-63hk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27577
reference_id
reference_type
scores
0
value 0.01205
scoring_system epss
scoring_elements 0.78899
published_at 2026-04-01T12:55:00Z
1
value 0.01205
scoring_system epss
scoring_elements 0.78905
published_at 2026-04-02T12:55:00Z
2
value 0.01205
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-04T12:55:00Z
3
value 0.01205
scoring_system epss
scoring_elements 0.78917
published_at 2026-04-07T12:55:00Z
4
value 0.01205
scoring_system epss
scoring_elements 0.78942
published_at 2026-04-08T12:55:00Z
5
value 0.01205
scoring_system epss
scoring_elements 0.78948
published_at 2026-04-09T12:55:00Z
6
value 0.01205
scoring_system epss
scoring_elements 0.78972
published_at 2026-04-18T12:55:00Z
7
value 0.01205
scoring_system epss
scoring_elements 0.78957
published_at 2026-04-12T12:55:00Z
8
value 0.01205
scoring_system epss
scoring_elements 0.78947
published_at 2026-04-13T12:55:00Z
9
value 0.01205
scoring_system epss
scoring_elements 0.78975
published_at 2026-04-16T12:55:00Z
10
value 0.01205
scoring_system epss
scoring_elements 0.78971
published_at 2026-04-21T12:55:00Z
11
value 0.01205
scoring_system epss
scoring_elements 0.79001
published_at 2026-04-24T12:55:00Z
12
value 0.01205
scoring_system epss
scoring_elements 0.79008
published_at 2026-04-26T12:55:00Z
13
value 0.01205
scoring_system epss
scoring_elements 0.79024
published_at 2026-04-29T12:55:00Z
14
value 0.01205
scoring_system epss
scoring_elements 0.79039
published_at 2026-05-05T12:55:00Z
15
value 0.01205
scoring_system epss
scoring_elements 0.7906
published_at 2026-05-07T12:55:00Z
16
value 0.01205
scoring_system epss
scoring_elements 0.79074
published_at 2026-05-09T12:55:00Z
17
value 0.01205
scoring_system epss
scoring_elements 0.79072
published_at 2026-05-11T12:55:00Z
18
value 0.01205
scoring_system epss
scoring_elements 0.79088
published_at 2026-05-12T12:55:00Z
19
value 0.01205
scoring_system epss
scoring_elements 0.79125
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27577
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-27577
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c675-5njd-63hk
8
url VCID-cbe5-hhz8-bqbn
vulnerability_id VCID-cbe5-hhz8-bqbn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44759
reference_id
reference_type
scores
0
value 0.02005
scoring_system epss
scoring_elements 0.83612
published_at 2026-04-01T12:55:00Z
1
value 0.02005
scoring_system epss
scoring_elements 0.83625
published_at 2026-04-02T12:55:00Z
2
value 0.02005
scoring_system epss
scoring_elements 0.83639
published_at 2026-04-04T12:55:00Z
3
value 0.02005
scoring_system epss
scoring_elements 0.83641
published_at 2026-04-07T12:55:00Z
4
value 0.02005
scoring_system epss
scoring_elements 0.83665
published_at 2026-04-08T12:55:00Z
5
value 0.02005
scoring_system epss
scoring_elements 0.83672
published_at 2026-04-09T12:55:00Z
6
value 0.02005
scoring_system epss
scoring_elements 0.83689
published_at 2026-04-11T12:55:00Z
7
value 0.02005
scoring_system epss
scoring_elements 0.83682
published_at 2026-04-12T12:55:00Z
8
value 0.02005
scoring_system epss
scoring_elements 0.83678
published_at 2026-04-13T12:55:00Z
9
value 0.02005
scoring_system epss
scoring_elements 0.83713
published_at 2026-04-16T12:55:00Z
10
value 0.02005
scoring_system epss
scoring_elements 0.83714
published_at 2026-04-21T12:55:00Z
11
value 0.02005
scoring_system epss
scoring_elements 0.83739
published_at 2026-04-24T12:55:00Z
12
value 0.02005
scoring_system epss
scoring_elements 0.83747
published_at 2026-04-26T12:55:00Z
13
value 0.02005
scoring_system epss
scoring_elements 0.83754
published_at 2026-04-29T12:55:00Z
14
value 0.02005
scoring_system epss
scoring_elements 0.83777
published_at 2026-05-05T12:55:00Z
15
value 0.02005
scoring_system epss
scoring_elements 0.83797
published_at 2026-05-07T12:55:00Z
16
value 0.02005
scoring_system epss
scoring_elements 0.83814
published_at 2026-05-11T12:55:00Z
17
value 0.02005
scoring_system epss
scoring_elements 0.8383
published_at 2026-05-12T12:55:00Z
18
value 0.02005
scoring_system epss
scoring_elements 0.83864
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44759
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-44759
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbe5-hhz8-bqbn
9
url VCID-cscf-sb71-jybq
vulnerability_id VCID-cscf-sb71-jybq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32566
reference_id
reference_type
scores
0
value 0.07927
scoring_system epss
scoring_elements 0.92013
published_at 2026-04-01T12:55:00Z
1
value 0.07927
scoring_system epss
scoring_elements 0.92019
published_at 2026-04-02T12:55:00Z
2
value 0.07927
scoring_system epss
scoring_elements 0.92027
published_at 2026-04-04T12:55:00Z
3
value 0.07927
scoring_system epss
scoring_elements 0.92032
published_at 2026-04-07T12:55:00Z
4
value 0.07927
scoring_system epss
scoring_elements 0.92044
published_at 2026-04-08T12:55:00Z
5
value 0.07927
scoring_system epss
scoring_elements 0.92047
published_at 2026-04-09T12:55:00Z
6
value 0.07927
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-12T12:55:00Z
7
value 0.07927
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-13T12:55:00Z
8
value 0.07927
scoring_system epss
scoring_elements 0.92066
published_at 2026-04-24T12:55:00Z
9
value 0.07927
scoring_system epss
scoring_elements 0.92063
published_at 2026-04-18T12:55:00Z
10
value 0.07927
scoring_system epss
scoring_elements 0.92061
published_at 2026-04-21T12:55:00Z
11
value 0.07927
scoring_system epss
scoring_elements 0.92064
published_at 2026-04-26T12:55:00Z
12
value 0.07927
scoring_system epss
scoring_elements 0.9206
published_at 2026-04-29T12:55:00Z
13
value 0.07927
scoring_system epss
scoring_elements 0.92072
published_at 2026-05-05T12:55:00Z
14
value 0.07927
scoring_system epss
scoring_elements 0.92085
published_at 2026-05-07T12:55:00Z
15
value 0.07927
scoring_system epss
scoring_elements 0.92093
published_at 2026-05-11T12:55:00Z
16
value 0.07927
scoring_system epss
scoring_elements 0.921
published_at 2026-05-12T12:55:00Z
17
value 0.07927
scoring_system epss
scoring_elements 0.9212
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32566
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32566
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cscf-sb71-jybq
10
url VCID-fmwc-nmhh-ryaf
vulnerability_id VCID-fmwc-nmhh-ryaf
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9481
reference_id
reference_type
scores
0
value 0.05231
scoring_system epss
scoring_elements 0.89916
published_at 2026-04-01T12:55:00Z
1
value 0.05231
scoring_system epss
scoring_elements 0.8992
published_at 2026-04-02T12:55:00Z
2
value 0.05231
scoring_system epss
scoring_elements 0.89932
published_at 2026-04-04T12:55:00Z
3
value 0.05231
scoring_system epss
scoring_elements 0.89938
published_at 2026-04-07T12:55:00Z
4
value 0.05231
scoring_system epss
scoring_elements 0.89955
published_at 2026-04-08T12:55:00Z
5
value 0.05231
scoring_system epss
scoring_elements 0.8996
published_at 2026-04-13T12:55:00Z
6
value 0.05231
scoring_system epss
scoring_elements 0.89968
published_at 2026-04-11T12:55:00Z
7
value 0.05231
scoring_system epss
scoring_elements 0.89966
published_at 2026-04-12T12:55:00Z
8
value 0.05231
scoring_system epss
scoring_elements 0.89974
published_at 2026-04-16T12:55:00Z
9
value 0.05231
scoring_system epss
scoring_elements 0.89975
published_at 2026-04-18T12:55:00Z
10
value 0.05231
scoring_system epss
scoring_elements 0.89971
published_at 2026-04-21T12:55:00Z
11
value 0.05231
scoring_system epss
scoring_elements 0.89988
published_at 2026-04-24T12:55:00Z
12
value 0.05231
scoring_system epss
scoring_elements 0.89987
published_at 2026-04-26T12:55:00Z
13
value 0.05231
scoring_system epss
scoring_elements 0.89986
published_at 2026-04-29T12:55:00Z
14
value 0.05231
scoring_system epss
scoring_elements 0.9
published_at 2026-05-05T12:55:00Z
15
value 0.05231
scoring_system epss
scoring_elements 0.90014
published_at 2026-05-07T12:55:00Z
16
value 0.05231
scoring_system epss
scoring_elements 0.90026
published_at 2026-05-09T12:55:00Z
17
value 0.05231
scoring_system epss
scoring_elements 0.90021
published_at 2026-05-11T12:55:00Z
18
value 0.05231
scoring_system epss
scoring_elements 0.90029
published_at 2026-05-12T12:55:00Z
19
value 0.05231
scoring_system epss
scoring_elements 0.90044
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9481
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-9481
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fmwc-nmhh-ryaf
11
url VCID-fq5y-b9yq-nbee
vulnerability_id VCID-fq5y-b9yq-nbee
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37148
reference_id
reference_type
scores
0
value 0.01007
scoring_system epss
scoring_elements 0.76995
published_at 2026-04-01T12:55:00Z
1
value 0.01007
scoring_system epss
scoring_elements 0.77001
published_at 2026-04-02T12:55:00Z
2
value 0.01007
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-04T12:55:00Z
3
value 0.01007
scoring_system epss
scoring_elements 0.77011
published_at 2026-04-07T12:55:00Z
4
value 0.01007
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-08T12:55:00Z
5
value 0.01007
scoring_system epss
scoring_elements 0.77053
published_at 2026-04-09T12:55:00Z
6
value 0.01007
scoring_system epss
scoring_elements 0.77082
published_at 2026-04-11T12:55:00Z
7
value 0.01007
scoring_system epss
scoring_elements 0.77061
published_at 2026-04-12T12:55:00Z
8
value 0.01007
scoring_system epss
scoring_elements 0.77056
published_at 2026-04-13T12:55:00Z
9
value 0.01007
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-16T12:55:00Z
10
value 0.01007
scoring_system epss
scoring_elements 0.77099
published_at 2026-04-18T12:55:00Z
11
value 0.01007
scoring_system epss
scoring_elements 0.7709
published_at 2026-04-21T12:55:00Z
12
value 0.01007
scoring_system epss
scoring_elements 0.77125
published_at 2026-04-24T12:55:00Z
13
value 0.01007
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-26T12:55:00Z
14
value 0.01007
scoring_system epss
scoring_elements 0.77146
published_at 2026-04-29T12:55:00Z
15
value 0.01363
scoring_system epss
scoring_elements 0.80274
published_at 2026-05-05T12:55:00Z
16
value 0.01363
scoring_system epss
scoring_elements 0.80297
published_at 2026-05-07T12:55:00Z
17
value 0.01363
scoring_system epss
scoring_elements 0.80313
published_at 2026-05-09T12:55:00Z
18
value 0.01363
scoring_system epss
scoring_elements 0.80309
published_at 2026-05-11T12:55:00Z
19
value 0.01363
scoring_system epss
scoring_elements 0.80326
published_at 2026-05-12T12:55:00Z
20
value 0.01363
scoring_system epss
scoring_elements 0.80367
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37148
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37148
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fq5y-b9yq-nbee
12
url VCID-hbte-dsw2-y7ad
vulnerability_id VCID-hbte-dsw2-y7ad
summary
golang.org/x/net/http vulnerable to ping floods
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

### Specific Go Packages Affected
golang.org/x/net/http2
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
7
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2594
8
reference_url https://access.redhat.com/errata/RHSA-2019:2661
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2661
9
reference_url https://access.redhat.com/errata/RHSA-2019:2682
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2682
10
reference_url https://access.redhat.com/errata/RHSA-2019:2690
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2690
11
reference_url https://access.redhat.com/errata/RHSA-2019:2726
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2726
12
reference_url https://access.redhat.com/errata/RHSA-2019:2766
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2766
13
reference_url https://access.redhat.com/errata/RHSA-2019:2769
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2769
14
reference_url https://access.redhat.com/errata/RHSA-2019:2796
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2796
15
reference_url https://access.redhat.com/errata/RHSA-2019:2861
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2861
16
reference_url https://access.redhat.com/errata/RHSA-2019:2925
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2925
17
reference_url https://access.redhat.com/errata/RHSA-2019:2939
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2939
18
reference_url https://access.redhat.com/errata/RHSA-2019:2955
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2955
19
reference_url https://access.redhat.com/errata/RHSA-2019:2966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2966
20
reference_url https://access.redhat.com/errata/RHSA-2019:3131
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3131
21
reference_url https://access.redhat.com/errata/RHSA-2019:3245
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3245
22
reference_url https://access.redhat.com/errata/RHSA-2019:3265
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3265
23
reference_url https://access.redhat.com/errata/RHSA-2019:3892
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3892
24
reference_url https://access.redhat.com/errata/RHSA-2019:3906
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3906
25
reference_url https://access.redhat.com/errata/RHSA-2019:4018
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4018
26
reference_url https://access.redhat.com/errata/RHSA-2019:4019
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4019
27
reference_url https://access.redhat.com/errata/RHSA-2019:4020
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4020
28
reference_url https://access.redhat.com/errata/RHSA-2019:4021
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4021
29
reference_url https://access.redhat.com/errata/RHSA-2019:4040
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4040
30
reference_url https://access.redhat.com/errata/RHSA-2019:4041
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4041
31
reference_url https://access.redhat.com/errata/RHSA-2019:4042
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4042
32
reference_url https://access.redhat.com/errata/RHSA-2019:4045
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4045
33
reference_url https://access.redhat.com/errata/RHSA-2019:4269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4269
34
reference_url https://access.redhat.com/errata/RHSA-2019:4273
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4273
35
reference_url https://access.redhat.com/errata/RHSA-2019:4352
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4352
36
reference_url https://access.redhat.com/errata/RHSA-2020:0406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0406
37
reference_url https://access.redhat.com/errata/RHSA-2020:0727
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0727
38
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9512.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9512.json
39
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9512
reference_id
reference_type
scores
0
value 0.51232
scoring_system epss
scoring_elements 0.97904
published_at 2026-05-14T12:55:00Z
1
value 0.51232
scoring_system epss
scoring_elements 0.97858
published_at 2026-04-01T12:55:00Z
2
value 0.51232
scoring_system epss
scoring_elements 0.97864
published_at 2026-04-02T12:55:00Z
3
value 0.51232
scoring_system epss
scoring_elements 0.97866
published_at 2026-04-04T12:55:00Z
4
value 0.51232
scoring_system epss
scoring_elements 0.97869
published_at 2026-04-07T12:55:00Z
5
value 0.51232
scoring_system epss
scoring_elements 0.97873
published_at 2026-04-08T12:55:00Z
6
value 0.51232
scoring_system epss
scoring_elements 0.97876
published_at 2026-04-09T12:55:00Z
7
value 0.51232
scoring_system epss
scoring_elements 0.97879
published_at 2026-04-11T12:55:00Z
8
value 0.51232
scoring_system epss
scoring_elements 0.9788
published_at 2026-04-12T12:55:00Z
9
value 0.51232
scoring_system epss
scoring_elements 0.97881
published_at 2026-04-13T12:55:00Z
10
value 0.51232
scoring_system epss
scoring_elements 0.97888
published_at 2026-04-21T12:55:00Z
11
value 0.51232
scoring_system epss
scoring_elements 0.9789
published_at 2026-04-18T12:55:00Z
12
value 0.51232
scoring_system epss
scoring_elements 0.97886
published_at 2026-04-24T12:55:00Z
13
value 0.51232
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-26T12:55:00Z
14
value 0.51232
scoring_system epss
scoring_elements 0.97891
published_at 2026-04-29T12:55:00Z
15
value 0.51232
scoring_system epss
scoring_elements 0.97896
published_at 2026-05-05T12:55:00Z
16
value 0.51232
scoring_system epss
scoring_elements 0.97894
published_at 2026-05-07T12:55:00Z
17
value 0.51232
scoring_system epss
scoring_elements 0.97897
published_at 2026-05-11T12:55:00Z
18
value 0.51232
scoring_system epss
scoring_elements 0.979
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9512
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
46
reference_url http://seclists.org/fulldisclosure/2019/Aug/16
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2019/Aug/16
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
49
reference_url https://go.dev/cl/190137
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/190137
50
reference_url https://go.dev/issue/33606
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/33606
51
reference_url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
52
reference_url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
53
reference_url https://kb.cert.org/vuls/id/605641
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kb.cert.org/vuls/id/605641
54
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
55
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
56
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
57
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
58
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
59
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
61
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
62
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9512
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-9512
64
reference_url https://pkg.go.dev/vuln/GO-2022-0536
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0536
65
reference_url https://seclists.org/bugtraq/2019/Aug/24
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/24
66
reference_url https://seclists.org/bugtraq/2019/Aug/31
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/31
67
reference_url https://seclists.org/bugtraq/2019/Aug/43
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/43
68
reference_url https://seclists.org/bugtraq/2019/Sep/18
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Sep/18
69
reference_url https://security.netapp.com/advisory/ntap-20190823-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0001
70
reference_url https://security.netapp.com/advisory/ntap-20190823-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0004
71
reference_url https://security.netapp.com/advisory/ntap-20190823-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0005
72
reference_url https://support.f5.com/csp/article/K98053339
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K98053339
73
reference_url https://support.f5.com/csp/article/K98053339?utm_source=f5support&utm_medium=RSS
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K98053339?utm_source=f5support&utm_medium=RSS
74
reference_url https://usn.ubuntu.com/4308-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4308-1
75
reference_url https://www.debian.org/security/2019/dsa-4503
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4503
76
reference_url https://www.debian.org/security/2019/dsa-4508
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4508
77
reference_url https://www.debian.org/security/2019/dsa-4520
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4520
78
reference_url https://www.synology.com/security/advisory/Synology_SA_19_33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.synology.com/security/advisory/Synology_SA_19_33
79
reference_url http://www.openwall.com/lists/oss-security/2019/08/20/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/08/20/1
80
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735645
reference_id 1735645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735645
81
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
82
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
83
reference_url https://security.archlinux.org/ASA-201908-15
reference_id ASA-201908-15
reference_type
scores
url https://security.archlinux.org/ASA-201908-15
84
reference_url https://security.archlinux.org/AVG-1021
reference_id AVG-1021
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1021
85
reference_url https://access.redhat.com/errata/RHSA-2019:2817
reference_id RHSA-2019:2817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2817
86
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
87
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
88
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
89
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
90
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
91
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
92
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
93
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
94
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9512, GHSA-hgr8-6h9x-f7q9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hbte-dsw2-y7ad
13
url VCID-j6r7-ypa1-zybv
vulnerability_id VCID-j6r7-ypa1-zybv
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17509
reference_id
reference_type
scores
0
value 0.03046
scoring_system epss
scoring_elements 0.86623
published_at 2026-04-01T12:55:00Z
1
value 0.03046
scoring_system epss
scoring_elements 0.86635
published_at 2026-04-02T12:55:00Z
2
value 0.03046
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-04T12:55:00Z
3
value 0.03046
scoring_system epss
scoring_elements 0.86653
published_at 2026-04-07T12:55:00Z
4
value 0.03046
scoring_system epss
scoring_elements 0.86673
published_at 2026-04-08T12:55:00Z
5
value 0.03046
scoring_system epss
scoring_elements 0.86682
published_at 2026-04-09T12:55:00Z
6
value 0.03046
scoring_system epss
scoring_elements 0.86696
published_at 2026-04-11T12:55:00Z
7
value 0.03046
scoring_system epss
scoring_elements 0.86693
published_at 2026-04-12T12:55:00Z
8
value 0.03046
scoring_system epss
scoring_elements 0.86686
published_at 2026-04-13T12:55:00Z
9
value 0.03046
scoring_system epss
scoring_elements 0.867
published_at 2026-04-16T12:55:00Z
10
value 0.03046
scoring_system epss
scoring_elements 0.86706
published_at 2026-04-18T12:55:00Z
11
value 0.03046
scoring_system epss
scoring_elements 0.86699
published_at 2026-04-21T12:55:00Z
12
value 0.03046
scoring_system epss
scoring_elements 0.86717
published_at 2026-04-24T12:55:00Z
13
value 0.03046
scoring_system epss
scoring_elements 0.86725
published_at 2026-04-26T12:55:00Z
14
value 0.03046
scoring_system epss
scoring_elements 0.86726
published_at 2026-04-29T12:55:00Z
15
value 0.03046
scoring_system epss
scoring_elements 0.86747
published_at 2026-05-05T12:55:00Z
16
value 0.03046
scoring_system epss
scoring_elements 0.86765
published_at 2026-05-07T12:55:00Z
17
value 0.03046
scoring_system epss
scoring_elements 0.86782
published_at 2026-05-09T12:55:00Z
18
value 0.03046
scoring_system epss
scoring_elements 0.86777
published_at 2026-05-11T12:55:00Z
19
value 0.03046
scoring_system epss
scoring_elements 0.86789
published_at 2026-05-12T12:55:00Z
20
value 0.03046
scoring_system epss
scoring_elements 0.8682
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17509
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-17509
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6r7-ypa1-zybv
14
url VCID-k2ks-3t6e-uqgu
vulnerability_id VCID-k2ks-3t6e-uqgu
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1944
reference_id
reference_type
scores
0
value 0.01208
scoring_system epss
scoring_elements 0.79153
published_at 2026-05-14T12:55:00Z
1
value 0.01208
scoring_system epss
scoring_elements 0.79117
published_at 2026-05-12T12:55:00Z
2
value 0.01208
scoring_system epss
scoring_elements 0.78928
published_at 2026-04-01T12:55:00Z
3
value 0.01208
scoring_system epss
scoring_elements 0.78934
published_at 2026-04-02T12:55:00Z
4
value 0.01208
scoring_system epss
scoring_elements 0.78961
published_at 2026-04-04T12:55:00Z
5
value 0.01208
scoring_system epss
scoring_elements 0.78945
published_at 2026-04-07T12:55:00Z
6
value 0.01208
scoring_system epss
scoring_elements 0.7897
published_at 2026-04-08T12:55:00Z
7
value 0.01208
scoring_system epss
scoring_elements 0.78976
published_at 2026-04-09T12:55:00Z
8
value 0.01208
scoring_system epss
scoring_elements 0.78999
published_at 2026-04-21T12:55:00Z
9
value 0.01208
scoring_system epss
scoring_elements 0.78984
published_at 2026-04-12T12:55:00Z
10
value 0.01208
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-13T12:55:00Z
11
value 0.01208
scoring_system epss
scoring_elements 0.79002
published_at 2026-04-16T12:55:00Z
12
value 0.01208
scoring_system epss
scoring_elements 0.79029
published_at 2026-04-24T12:55:00Z
13
value 0.01208
scoring_system epss
scoring_elements 0.79036
published_at 2026-04-26T12:55:00Z
14
value 0.01208
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-29T12:55:00Z
15
value 0.01208
scoring_system epss
scoring_elements 0.79067
published_at 2026-05-05T12:55:00Z
16
value 0.01208
scoring_system epss
scoring_elements 0.79087
published_at 2026-05-07T12:55:00Z
17
value 0.01208
scoring_system epss
scoring_elements 0.79104
published_at 2026-05-09T12:55:00Z
18
value 0.01208
scoring_system epss
scoring_elements 0.79101
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1944
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481
5
reference_url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E
6
reference_url https://www.debian.org/security/2020/dsa-4672
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4672
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1944
reference_id CVE-2020-1944
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-1944
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-1944
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ks-3t6e-uqgu
15
url VCID-msu4-5h99-2yaq
vulnerability_id VCID-msu4-5h99-2yaq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5660
reference_id
reference_type
scores
0
value 0.02584
scoring_system epss
scoring_elements 0.85502
published_at 2026-04-01T12:55:00Z
1
value 0.02584
scoring_system epss
scoring_elements 0.85514
published_at 2026-04-02T12:55:00Z
2
value 0.02584
scoring_system epss
scoring_elements 0.85531
published_at 2026-04-04T12:55:00Z
3
value 0.02584
scoring_system epss
scoring_elements 0.85536
published_at 2026-04-07T12:55:00Z
4
value 0.02584
scoring_system epss
scoring_elements 0.85556
published_at 2026-04-08T12:55:00Z
5
value 0.02584
scoring_system epss
scoring_elements 0.85566
published_at 2026-04-09T12:55:00Z
6
value 0.02584
scoring_system epss
scoring_elements 0.85581
published_at 2026-04-11T12:55:00Z
7
value 0.02584
scoring_system epss
scoring_elements 0.85578
published_at 2026-04-12T12:55:00Z
8
value 0.02584
scoring_system epss
scoring_elements 0.85574
published_at 2026-04-13T12:55:00Z
9
value 0.02584
scoring_system epss
scoring_elements 0.85596
published_at 2026-04-16T12:55:00Z
10
value 0.02584
scoring_system epss
scoring_elements 0.85602
published_at 2026-04-18T12:55:00Z
11
value 0.02584
scoring_system epss
scoring_elements 0.85598
published_at 2026-04-21T12:55:00Z
12
value 0.02584
scoring_system epss
scoring_elements 0.85619
published_at 2026-04-24T12:55:00Z
13
value 0.02584
scoring_system epss
scoring_elements 0.8563
published_at 2026-04-26T12:55:00Z
14
value 0.02584
scoring_system epss
scoring_elements 0.85632
published_at 2026-04-29T12:55:00Z
15
value 0.02584
scoring_system epss
scoring_elements 0.8565
published_at 2026-05-05T12:55:00Z
16
value 0.02584
scoring_system epss
scoring_elements 0.85672
published_at 2026-05-07T12:55:00Z
17
value 0.02584
scoring_system epss
scoring_elements 0.85689
published_at 2026-05-09T12:55:00Z
18
value 0.02584
scoring_system epss
scoring_elements 0.85684
published_at 2026-05-11T12:55:00Z
19
value 0.02584
scoring_system epss
scoring_elements 0.85697
published_at 2026-05-12T12:55:00Z
20
value 0.02584
scoring_system epss
scoring_elements 0.85734
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5660
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2017-5660
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-msu4-5h99-2yaq
16
url VCID-n66u-b73u-zucb
vulnerability_id VCID-n66u-b73u-zucb
summary
golang.org/x/net/http vulnerable to a reset flood
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

### Specific Go Packages Affected
golang.org/x/net/http2
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
7
reference_url https://access.redhat.com/errata/RHSA-2019:2594
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2594
8
reference_url https://access.redhat.com/errata/RHSA-2019:2661
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2661
9
reference_url https://access.redhat.com/errata/RHSA-2019:2682
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2682
10
reference_url https://access.redhat.com/errata/RHSA-2019:2690
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2690
11
reference_url https://access.redhat.com/errata/RHSA-2019:2726
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2726
12
reference_url https://access.redhat.com/errata/RHSA-2019:2766
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2766
13
reference_url https://access.redhat.com/errata/RHSA-2019:2769
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2769
14
reference_url https://access.redhat.com/errata/RHSA-2019:2796
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2796
15
reference_url https://access.redhat.com/errata/RHSA-2019:2861
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2861
16
reference_url https://access.redhat.com/errata/RHSA-2019:2925
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2925
17
reference_url https://access.redhat.com/errata/RHSA-2019:2939
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2939
18
reference_url https://access.redhat.com/errata/RHSA-2019:2955
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2955
19
reference_url https://access.redhat.com/errata/RHSA-2019:2966
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:2966
20
reference_url https://access.redhat.com/errata/RHSA-2019:3131
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3131
21
reference_url https://access.redhat.com/errata/RHSA-2019:3245
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3245
22
reference_url https://access.redhat.com/errata/RHSA-2019:3265
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3265
23
reference_url https://access.redhat.com/errata/RHSA-2019:3892
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3892
24
reference_url https://access.redhat.com/errata/RHSA-2019:3906
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:3906
25
reference_url https://access.redhat.com/errata/RHSA-2019:4018
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4018
26
reference_url https://access.redhat.com/errata/RHSA-2019:4019
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4019
27
reference_url https://access.redhat.com/errata/RHSA-2019:4020
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4020
28
reference_url https://access.redhat.com/errata/RHSA-2019:4021
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4021
29
reference_url https://access.redhat.com/errata/RHSA-2019:4040
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4040
30
reference_url https://access.redhat.com/errata/RHSA-2019:4041
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4041
31
reference_url https://access.redhat.com/errata/RHSA-2019:4042
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4042
32
reference_url https://access.redhat.com/errata/RHSA-2019:4045
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4045
33
reference_url https://access.redhat.com/errata/RHSA-2019:4269
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4269
34
reference_url https://access.redhat.com/errata/RHSA-2019:4273
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4273
35
reference_url https://access.redhat.com/errata/RHSA-2019:4352
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:4352
36
reference_url https://access.redhat.com/errata/RHSA-2020:0406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0406
37
reference_url https://access.redhat.com/errata/RHSA-2020:0727
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0727
38
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9514.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9514.json
39
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9514
reference_id
reference_type
scores
0
value 0.09483
scoring_system epss
scoring_elements 0.92914
published_at 2026-05-14T12:55:00Z
1
value 0.09483
scoring_system epss
scoring_elements 0.92799
published_at 2026-04-01T12:55:00Z
2
value 0.09483
scoring_system epss
scoring_elements 0.92806
published_at 2026-04-02T12:55:00Z
3
value 0.09483
scoring_system epss
scoring_elements 0.9281
published_at 2026-04-04T12:55:00Z
4
value 0.09483
scoring_system epss
scoring_elements 0.92809
published_at 2026-04-07T12:55:00Z
5
value 0.09483
scoring_system epss
scoring_elements 0.92818
published_at 2026-04-08T12:55:00Z
6
value 0.09483
scoring_system epss
scoring_elements 0.92822
published_at 2026-04-09T12:55:00Z
7
value 0.09483
scoring_system epss
scoring_elements 0.92826
published_at 2026-04-13T12:55:00Z
8
value 0.09483
scoring_system epss
scoring_elements 0.92825
published_at 2026-04-12T12:55:00Z
9
value 0.09483
scoring_system epss
scoring_elements 0.92836
published_at 2026-04-16T12:55:00Z
10
value 0.09483
scoring_system epss
scoring_elements 0.92837
published_at 2026-04-18T12:55:00Z
11
value 0.09483
scoring_system epss
scoring_elements 0.92841
published_at 2026-04-21T12:55:00Z
12
value 0.09483
scoring_system epss
scoring_elements 0.92848
published_at 2026-04-24T12:55:00Z
13
value 0.09483
scoring_system epss
scoring_elements 0.9285
published_at 2026-04-26T12:55:00Z
14
value 0.09483
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-29T12:55:00Z
15
value 0.09483
scoring_system epss
scoring_elements 0.92853
published_at 2026-05-05T12:55:00Z
16
value 0.09483
scoring_system epss
scoring_elements 0.92867
published_at 2026-05-07T12:55:00Z
17
value 0.09483
scoring_system epss
scoring_elements 0.92878
published_at 2026-05-09T12:55:00Z
18
value 0.09483
scoring_system epss
scoring_elements 0.92882
published_at 2026-05-11T12:55:00Z
19
value 0.09483
scoring_system epss
scoring_elements 0.92889
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9514
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
51
reference_url http://seclists.org/fulldisclosure/2019/Aug/16
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2019/Aug/16
52
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
53
reference_url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
54
reference_url https://go.dev/cl/190137
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/190137
55
reference_url https://go.dev/issue/33606
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/issue/33606
56
reference_url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
57
reference_url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
58
reference_url https://kb.cert.org/vuls/id/605641
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kb.cert.org/vuls/id/605641
59
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kc.mcafee.com/corporate/index?page=content&id=SB10296
60
reference_url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
61
reference_url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
62
reference_url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
63
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
64
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7
65
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC
66
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP
67
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ
68
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9514
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-9514
69
reference_url https://pkg.go.dev/vuln/GO-2022-0536
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2022-0536
70
reference_url https://seclists.org/bugtraq/2019/Aug/24
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/24
71
reference_url https://seclists.org/bugtraq/2019/Aug/31
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/31
72
reference_url https://seclists.org/bugtraq/2019/Aug/43
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Aug/43
73
reference_url https://seclists.org/bugtraq/2019/Sep/18
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/bugtraq/2019/Sep/18
74
reference_url https://security.netapp.com/advisory/ntap-20190823-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0001
75
reference_url https://security.netapp.com/advisory/ntap-20190823-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0004
76
reference_url https://security.netapp.com/advisory/ntap-20190823-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20190823-0005
77
reference_url https://support.f5.com/csp/article/K01988340
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K01988340
78
reference_url https://support.f5.com/csp/article/K01988340?utm_source=f5support&utm_medium=RSS
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://support.f5.com/csp/article/K01988340?utm_source=f5support&utm_medium=RSS
79
reference_url https://usn.ubuntu.com/4308-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4308-1
80
reference_url https://www.debian.org/security/2019/dsa-4503
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4503
81
reference_url https://www.debian.org/security/2019/dsa-4508
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4508
82
reference_url https://www.debian.org/security/2019/dsa-4520
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2019/dsa-4520
83
reference_url https://www.debian.org/security/2020/dsa-4669
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2020/dsa-4669
84
reference_url https://www.synology.com/security/advisory/Synology_SA_19_33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.synology.com/security/advisory/Synology_SA_19_33
85
reference_url http://www.openwall.com/lists/oss-security/2019/08/20/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/08/20/1
86
reference_url http://www.openwall.com/lists/oss-security/2023/10/18/8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2023/10/18/8
87
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062667
reference_id 1062667
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062667
88
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1735744
reference_id 1735744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1735744
89
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885
reference_id 934885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885
90
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
reference_id 934886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
91
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
reference_id 934887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887
92
reference_url https://security.archlinux.org/ASA-201908-15
reference_id ASA-201908-15
reference_type
scores
url https://security.archlinux.org/ASA-201908-15
93
reference_url https://security.archlinux.org/AVG-1021
reference_id AVG-1021
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1021
94
reference_url https://access.redhat.com/errata/RHSA-2019:2817
reference_id RHSA-2019:2817
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2817
95
reference_url https://access.redhat.com/errata/RHSA-2020:0922
reference_id RHSA-2020:0922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0922
96
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
97
reference_url https://access.redhat.com/errata/RHSA-2020:1445
reference_id RHSA-2020:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1445
98
reference_url https://access.redhat.com/errata/RHSA-2020:2067
reference_id RHSA-2020:2067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2067
99
reference_url https://access.redhat.com/errata/RHSA-2020:2565
reference_id RHSA-2020:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2565
100
reference_url https://access.redhat.com/errata/RHSA-2020:3196
reference_id RHSA-2020:3196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3196
101
reference_url https://access.redhat.com/errata/RHSA-2020:3197
reference_id RHSA-2020:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3197
102
reference_url https://access.redhat.com/errata/RHSA-2024:5856
reference_id RHSA-2024:5856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5856
103
reference_url https://usn.ubuntu.com/USN-4866-1/
reference_id USN-USN-4866-1
reference_type
scores
url https://usn.ubuntu.com/USN-4866-1/
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2019-9514, GHSA-39qc-96h7-956f
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n66u-b73u-zucb
17
url VCID-nbwy-fdv2-uydt
vulnerability_id VCID-nbwy-fdv2-uydt
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7671
reference_id
reference_type
scores
0
value 0.0427
scoring_system epss
scoring_elements 0.88778
published_at 2026-04-01T12:55:00Z
1
value 0.0427
scoring_system epss
scoring_elements 0.88786
published_at 2026-04-02T12:55:00Z
2
value 0.0427
scoring_system epss
scoring_elements 0.88802
published_at 2026-04-04T12:55:00Z
3
value 0.0427
scoring_system epss
scoring_elements 0.88805
published_at 2026-04-07T12:55:00Z
4
value 0.0427
scoring_system epss
scoring_elements 0.88822
published_at 2026-04-08T12:55:00Z
5
value 0.0427
scoring_system epss
scoring_elements 0.88827
published_at 2026-04-09T12:55:00Z
6
value 0.0427
scoring_system epss
scoring_elements 0.88839
published_at 2026-04-11T12:55:00Z
7
value 0.0427
scoring_system epss
scoring_elements 0.88835
published_at 2026-04-12T12:55:00Z
8
value 0.0427
scoring_system epss
scoring_elements 0.88834
published_at 2026-04-13T12:55:00Z
9
value 0.0427
scoring_system epss
scoring_elements 0.88848
published_at 2026-04-16T12:55:00Z
10
value 0.0427
scoring_system epss
scoring_elements 0.88846
published_at 2026-04-18T12:55:00Z
11
value 0.0427
scoring_system epss
scoring_elements 0.88843
published_at 2026-04-21T12:55:00Z
12
value 0.0427
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-24T12:55:00Z
13
value 0.0427
scoring_system epss
scoring_elements 0.88865
published_at 2026-04-29T12:55:00Z
14
value 0.0427
scoring_system epss
scoring_elements 0.88876
published_at 2026-05-05T12:55:00Z
15
value 0.0427
scoring_system epss
scoring_elements 0.88892
published_at 2026-05-07T12:55:00Z
16
value 0.0427
scoring_system epss
scoring_elements 0.88904
published_at 2026-05-09T12:55:00Z
17
value 0.0427
scoring_system epss
scoring_elements 0.88898
published_at 2026-05-11T12:55:00Z
18
value 0.0427
scoring_system epss
scoring_elements 0.88908
published_at 2026-05-12T12:55:00Z
19
value 0.0427
scoring_system epss
scoring_elements 0.88927
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7671
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2017-7671
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbwy-fdv2-uydt
18
url VCID-pxaf-6qxa-77h9
vulnerability_id VCID-pxaf-6qxa-77h9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17508
reference_id
reference_type
scores
0
value 0.02656
scoring_system epss
scoring_elements 0.85704
published_at 2026-04-01T12:55:00Z
1
value 0.02656
scoring_system epss
scoring_elements 0.85716
published_at 2026-04-02T12:55:00Z
2
value 0.02656
scoring_system epss
scoring_elements 0.85735
published_at 2026-04-04T12:55:00Z
3
value 0.02656
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-07T12:55:00Z
4
value 0.02656
scoring_system epss
scoring_elements 0.8576
published_at 2026-04-08T12:55:00Z
5
value 0.02656
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-09T12:55:00Z
6
value 0.02656
scoring_system epss
scoring_elements 0.85786
published_at 2026-04-11T12:55:00Z
7
value 0.02656
scoring_system epss
scoring_elements 0.85783
published_at 2026-04-12T12:55:00Z
8
value 0.02656
scoring_system epss
scoring_elements 0.8578
published_at 2026-04-13T12:55:00Z
9
value 0.02656
scoring_system epss
scoring_elements 0.85798
published_at 2026-04-16T12:55:00Z
10
value 0.02656
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-18T12:55:00Z
11
value 0.02656
scoring_system epss
scoring_elements 0.85795
published_at 2026-04-21T12:55:00Z
12
value 0.02656
scoring_system epss
scoring_elements 0.85819
published_at 2026-04-24T12:55:00Z
13
value 0.02656
scoring_system epss
scoring_elements 0.85829
published_at 2026-04-26T12:55:00Z
14
value 0.02656
scoring_system epss
scoring_elements 0.8583
published_at 2026-04-29T12:55:00Z
15
value 0.02656
scoring_system epss
scoring_elements 0.85846
published_at 2026-05-05T12:55:00Z
16
value 0.02656
scoring_system epss
scoring_elements 0.85869
published_at 2026-05-07T12:55:00Z
17
value 0.02656
scoring_system epss
scoring_elements 0.85885
published_at 2026-05-09T12:55:00Z
18
value 0.02656
scoring_system epss
scoring_elements 0.85883
published_at 2026-05-11T12:55:00Z
19
value 0.02656
scoring_system epss
scoring_elements 0.85897
published_at 2026-05-12T12:55:00Z
20
value 0.02656
scoring_system epss
scoring_elements 0.85932
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17508
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-17508
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxaf-6qxa-77h9
19
url VCID-qwmj-ez4q-7qex
vulnerability_id VCID-qwmj-ez4q-7qex
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1318
reference_id
reference_type
scores
0
value 0.14594
scoring_system epss
scoring_elements 0.94434
published_at 2026-04-01T12:55:00Z
1
value 0.14594
scoring_system epss
scoring_elements 0.94442
published_at 2026-04-02T12:55:00Z
2
value 0.14594
scoring_system epss
scoring_elements 0.94453
published_at 2026-04-04T12:55:00Z
3
value 0.14594
scoring_system epss
scoring_elements 0.94454
published_at 2026-04-07T12:55:00Z
4
value 0.14594
scoring_system epss
scoring_elements 0.94464
published_at 2026-04-08T12:55:00Z
5
value 0.14594
scoring_system epss
scoring_elements 0.94468
published_at 2026-04-09T12:55:00Z
6
value 0.14594
scoring_system epss
scoring_elements 0.94471
published_at 2026-04-11T12:55:00Z
7
value 0.14594
scoring_system epss
scoring_elements 0.94473
published_at 2026-04-13T12:55:00Z
8
value 0.14594
scoring_system epss
scoring_elements 0.94487
published_at 2026-04-16T12:55:00Z
9
value 0.14594
scoring_system epss
scoring_elements 0.94491
published_at 2026-04-18T12:55:00Z
10
value 0.14594
scoring_system epss
scoring_elements 0.94495
published_at 2026-04-24T12:55:00Z
11
value 0.14594
scoring_system epss
scoring_elements 0.94494
published_at 2026-04-29T12:55:00Z
12
value 0.14594
scoring_system epss
scoring_elements 0.945
published_at 2026-05-05T12:55:00Z
13
value 0.14594
scoring_system epss
scoring_elements 0.94507
published_at 2026-05-07T12:55:00Z
14
value 0.14594
scoring_system epss
scoring_elements 0.94517
published_at 2026-05-09T12:55:00Z
15
value 0.14594
scoring_system epss
scoring_elements 0.94521
published_at 2026-05-11T12:55:00Z
16
value 0.14594
scoring_system epss
scoring_elements 0.94528
published_at 2026-05-12T12:55:00Z
17
value 0.14594
scoring_system epss
scoring_elements 0.94541
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1318
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-1318
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwmj-ez4q-7qex
20
url VCID-r86j-zujn-f7ez
vulnerability_id VCID-r86j-zujn-f7ez
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8005
reference_id
reference_type
scores
0
value 0.06689
scoring_system epss
scoring_elements 0.9119
published_at 2026-04-01T12:55:00Z
1
value 0.06689
scoring_system epss
scoring_elements 0.91195
published_at 2026-04-02T12:55:00Z
2
value 0.06689
scoring_system epss
scoring_elements 0.91203
published_at 2026-04-04T12:55:00Z
3
value 0.06689
scoring_system epss
scoring_elements 0.9121
published_at 2026-04-07T12:55:00Z
4
value 0.06689
scoring_system epss
scoring_elements 0.91223
published_at 2026-04-08T12:55:00Z
5
value 0.06689
scoring_system epss
scoring_elements 0.9123
published_at 2026-04-09T12:55:00Z
6
value 0.06689
scoring_system epss
scoring_elements 0.91237
published_at 2026-04-11T12:55:00Z
7
value 0.06689
scoring_system epss
scoring_elements 0.9124
published_at 2026-04-12T12:55:00Z
8
value 0.06689
scoring_system epss
scoring_elements 0.91239
published_at 2026-04-13T12:55:00Z
9
value 0.06689
scoring_system epss
scoring_elements 0.91264
published_at 2026-04-16T12:55:00Z
10
value 0.06689
scoring_system epss
scoring_elements 0.91263
published_at 2026-04-18T12:55:00Z
11
value 0.06689
scoring_system epss
scoring_elements 0.91265
published_at 2026-04-21T12:55:00Z
12
value 0.06689
scoring_system epss
scoring_elements 0.91275
published_at 2026-04-29T12:55:00Z
13
value 0.06689
scoring_system epss
scoring_elements 0.9129
published_at 2026-05-05T12:55:00Z
14
value 0.06689
scoring_system epss
scoring_elements 0.91307
published_at 2026-05-07T12:55:00Z
15
value 0.06689
scoring_system epss
scoring_elements 0.91318
published_at 2026-05-09T12:55:00Z
16
value 0.06689
scoring_system epss
scoring_elements 0.91316
published_at 2026-05-11T12:55:00Z
17
value 0.06689
scoring_system epss
scoring_elements 0.91325
published_at 2026-05-12T12:55:00Z
18
value 0.06689
scoring_system epss
scoring_elements 0.91336
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8005
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-8005
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r86j-zujn-f7ez
21
url VCID-t559-a5u6-4ke1
vulnerability_id VCID-t559-a5u6-4ke1
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37147
reference_id
reference_type
scores
0
value 0.00656
scoring_system epss
scoring_elements 0.70964
published_at 2026-04-01T12:55:00Z
1
value 0.00656
scoring_system epss
scoring_elements 0.70973
published_at 2026-04-02T12:55:00Z
2
value 0.00656
scoring_system epss
scoring_elements 0.70991
published_at 2026-04-04T12:55:00Z
3
value 0.00656
scoring_system epss
scoring_elements 0.70966
published_at 2026-04-07T12:55:00Z
4
value 0.00656
scoring_system epss
scoring_elements 0.71008
published_at 2026-04-08T12:55:00Z
5
value 0.00656
scoring_system epss
scoring_elements 0.71023
published_at 2026-04-09T12:55:00Z
6
value 0.00656
scoring_system epss
scoring_elements 0.71045
published_at 2026-04-11T12:55:00Z
7
value 0.00656
scoring_system epss
scoring_elements 0.7103
published_at 2026-04-12T12:55:00Z
8
value 0.00656
scoring_system epss
scoring_elements 0.71013
published_at 2026-04-13T12:55:00Z
9
value 0.00656
scoring_system epss
scoring_elements 0.71059
published_at 2026-04-16T12:55:00Z
10
value 0.00656
scoring_system epss
scoring_elements 0.71066
published_at 2026-04-18T12:55:00Z
11
value 0.00656
scoring_system epss
scoring_elements 0.71046
published_at 2026-04-21T12:55:00Z
12
value 0.00656
scoring_system epss
scoring_elements 0.71101
published_at 2026-04-24T12:55:00Z
13
value 0.00656
scoring_system epss
scoring_elements 0.7111
published_at 2026-04-26T12:55:00Z
14
value 0.00656
scoring_system epss
scoring_elements 0.71115
published_at 2026-04-29T12:55:00Z
15
value 0.0089
scoring_system epss
scoring_elements 0.75613
published_at 2026-05-05T12:55:00Z
16
value 0.0089
scoring_system epss
scoring_elements 0.75643
published_at 2026-05-07T12:55:00Z
17
value 0.0089
scoring_system epss
scoring_elements 0.75668
published_at 2026-05-09T12:55:00Z
18
value 0.0089
scoring_system epss
scoring_elements 0.75653
published_at 2026-05-11T12:55:00Z
19
value 0.0089
scoring_system epss
scoring_elements 0.7567
published_at 2026-05-12T12:55:00Z
20
value 0.0089
scoring_system epss
scoring_elements 0.75725
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37147
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37147
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t559-a5u6-4ke1
22
url VCID-ue7s-pn8b-vydz
vulnerability_id VCID-ue7s-pn8b-vydz
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8004
reference_id
reference_type
scores
0
value 0.02594
scoring_system epss
scoring_elements 0.85523
published_at 2026-04-01T12:55:00Z
1
value 0.02594
scoring_system epss
scoring_elements 0.85535
published_at 2026-04-02T12:55:00Z
2
value 0.02594
scoring_system epss
scoring_elements 0.85553
published_at 2026-04-04T12:55:00Z
3
value 0.02594
scoring_system epss
scoring_elements 0.85558
published_at 2026-04-07T12:55:00Z
4
value 0.02594
scoring_system epss
scoring_elements 0.85578
published_at 2026-04-08T12:55:00Z
5
value 0.02594
scoring_system epss
scoring_elements 0.85589
published_at 2026-04-09T12:55:00Z
6
value 0.02594
scoring_system epss
scoring_elements 0.85603
published_at 2026-04-11T12:55:00Z
7
value 0.02594
scoring_system epss
scoring_elements 0.856
published_at 2026-04-12T12:55:00Z
8
value 0.02594
scoring_system epss
scoring_elements 0.85596
published_at 2026-04-13T12:55:00Z
9
value 0.02594
scoring_system epss
scoring_elements 0.85618
published_at 2026-04-16T12:55:00Z
10
value 0.02594
scoring_system epss
scoring_elements 0.85624
published_at 2026-04-18T12:55:00Z
11
value 0.02594
scoring_system epss
scoring_elements 0.8562
published_at 2026-04-21T12:55:00Z
12
value 0.02594
scoring_system epss
scoring_elements 0.85641
published_at 2026-04-24T12:55:00Z
13
value 0.02594
scoring_system epss
scoring_elements 0.85652
published_at 2026-04-26T12:55:00Z
14
value 0.02594
scoring_system epss
scoring_elements 0.85654
published_at 2026-04-29T12:55:00Z
15
value 0.02594
scoring_system epss
scoring_elements 0.85672
published_at 2026-05-05T12:55:00Z
16
value 0.02594
scoring_system epss
scoring_elements 0.85693
published_at 2026-05-07T12:55:00Z
17
value 0.02594
scoring_system epss
scoring_elements 0.8571
published_at 2026-05-09T12:55:00Z
18
value 0.02594
scoring_system epss
scoring_elements 0.85705
published_at 2026-05-11T12:55:00Z
19
value 0.02594
scoring_system epss
scoring_elements 0.85718
published_at 2026-05-12T12:55:00Z
20
value 0.02594
scoring_system epss
scoring_elements 0.85754
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8004
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-8004
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ue7s-pn8b-vydz
23
url VCID-uhqf-tsxe-ayc2
vulnerability_id VCID-uhqf-tsxe-ayc2
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37149
reference_id
reference_type
scores
0
value 0.01007
scoring_system epss
scoring_elements 0.76995
published_at 2026-04-01T12:55:00Z
1
value 0.01007
scoring_system epss
scoring_elements 0.77001
published_at 2026-04-02T12:55:00Z
2
value 0.01007
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-04T12:55:00Z
3
value 0.01007
scoring_system epss
scoring_elements 0.77011
published_at 2026-04-07T12:55:00Z
4
value 0.01007
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-08T12:55:00Z
5
value 0.01007
scoring_system epss
scoring_elements 0.77053
published_at 2026-04-09T12:55:00Z
6
value 0.01007
scoring_system epss
scoring_elements 0.77082
published_at 2026-04-11T12:55:00Z
7
value 0.01007
scoring_system epss
scoring_elements 0.77061
published_at 2026-04-12T12:55:00Z
8
value 0.01007
scoring_system epss
scoring_elements 0.77056
published_at 2026-04-13T12:55:00Z
9
value 0.01007
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-16T12:55:00Z
10
value 0.01007
scoring_system epss
scoring_elements 0.77099
published_at 2026-04-18T12:55:00Z
11
value 0.01007
scoring_system epss
scoring_elements 0.7709
published_at 2026-04-21T12:55:00Z
12
value 0.01007
scoring_system epss
scoring_elements 0.77125
published_at 2026-04-24T12:55:00Z
13
value 0.01007
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-26T12:55:00Z
14
value 0.01007
scoring_system epss
scoring_elements 0.77146
published_at 2026-04-29T12:55:00Z
15
value 0.01363
scoring_system epss
scoring_elements 0.80274
published_at 2026-05-05T12:55:00Z
16
value 0.01363
scoring_system epss
scoring_elements 0.80297
published_at 2026-05-07T12:55:00Z
17
value 0.01363
scoring_system epss
scoring_elements 0.80313
published_at 2026-05-09T12:55:00Z
18
value 0.01363
scoring_system epss
scoring_elements 0.80309
published_at 2026-05-11T12:55:00Z
19
value 0.01363
scoring_system epss
scoring_elements 0.80326
published_at 2026-05-12T12:55:00Z
20
value 0.01363
scoring_system epss
scoring_elements 0.80367
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37149
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-37149
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhqf-tsxe-ayc2
24
url VCID-uhxq-9bzs-u3fd
vulnerability_id VCID-uhxq-9bzs-u3fd
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35474
reference_id
reference_type
scores
0
value 0.09211
scoring_system epss
scoring_elements 0.92679
published_at 2026-04-01T12:55:00Z
1
value 0.09211
scoring_system epss
scoring_elements 0.92686
published_at 2026-04-02T12:55:00Z
2
value 0.09211
scoring_system epss
scoring_elements 0.92693
published_at 2026-04-04T12:55:00Z
3
value 0.09211
scoring_system epss
scoring_elements 0.92691
published_at 2026-04-07T12:55:00Z
4
value 0.09211
scoring_system epss
scoring_elements 0.92702
published_at 2026-04-08T12:55:00Z
5
value 0.09211
scoring_system epss
scoring_elements 0.92706
published_at 2026-04-09T12:55:00Z
6
value 0.09211
scoring_system epss
scoring_elements 0.92712
published_at 2026-04-12T12:55:00Z
7
value 0.09211
scoring_system epss
scoring_elements 0.9271
published_at 2026-04-13T12:55:00Z
8
value 0.09211
scoring_system epss
scoring_elements 0.92722
published_at 2026-04-18T12:55:00Z
9
value 0.09211
scoring_system epss
scoring_elements 0.92727
published_at 2026-04-21T12:55:00Z
10
value 0.09211
scoring_system epss
scoring_elements 0.9273
published_at 2026-04-26T12:55:00Z
11
value 0.09211
scoring_system epss
scoring_elements 0.92725
published_at 2026-04-29T12:55:00Z
12
value 0.09211
scoring_system epss
scoring_elements 0.92733
published_at 2026-05-05T12:55:00Z
13
value 0.09211
scoring_system epss
scoring_elements 0.92747
published_at 2026-05-07T12:55:00Z
14
value 0.09211
scoring_system epss
scoring_elements 0.92759
published_at 2026-05-09T12:55:00Z
15
value 0.09211
scoring_system epss
scoring_elements 0.92762
published_at 2026-05-11T12:55:00Z
16
value 0.09211
scoring_system epss
scoring_elements 0.92767
published_at 2026-05-12T12:55:00Z
17
value 0.09211
scoring_system epss
scoring_elements 0.92792
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-35474
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhxq-9bzs-u3fd
25
url VCID-va7d-ktp2-m7et
vulnerability_id VCID-va7d-ktp2-m7et
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8040
reference_id
reference_type
scores
0
value 0.07825
scoring_system epss
scoring_elements 0.91948
published_at 2026-04-01T12:55:00Z
1
value 0.07825
scoring_system epss
scoring_elements 0.91957
published_at 2026-04-02T12:55:00Z
2
value 0.07825
scoring_system epss
scoring_elements 0.91964
published_at 2026-04-04T12:55:00Z
3
value 0.07825
scoring_system epss
scoring_elements 0.9197
published_at 2026-04-07T12:55:00Z
4
value 0.07825
scoring_system epss
scoring_elements 0.91983
published_at 2026-04-08T12:55:00Z
5
value 0.07825
scoring_system epss
scoring_elements 0.91986
published_at 2026-04-09T12:55:00Z
6
value 0.07825
scoring_system epss
scoring_elements 0.91989
published_at 2026-04-11T12:55:00Z
7
value 0.07825
scoring_system epss
scoring_elements 0.91988
published_at 2026-04-12T12:55:00Z
8
value 0.07825
scoring_system epss
scoring_elements 0.91985
published_at 2026-04-13T12:55:00Z
9
value 0.07825
scoring_system epss
scoring_elements 0.92004
published_at 2026-04-16T12:55:00Z
10
value 0.07825
scoring_system epss
scoring_elements 0.92
published_at 2026-04-26T12:55:00Z
11
value 0.07825
scoring_system epss
scoring_elements 0.91997
published_at 2026-04-21T12:55:00Z
12
value 0.07825
scoring_system epss
scoring_elements 0.92001
published_at 2026-04-24T12:55:00Z
13
value 0.07825
scoring_system epss
scoring_elements 0.91996
published_at 2026-04-29T12:55:00Z
14
value 0.07825
scoring_system epss
scoring_elements 0.92009
published_at 2026-05-05T12:55:00Z
15
value 0.07825
scoring_system epss
scoring_elements 0.92023
published_at 2026-05-07T12:55:00Z
16
value 0.07825
scoring_system epss
scoring_elements 0.92032
published_at 2026-05-11T12:55:00Z
17
value 0.07825
scoring_system epss
scoring_elements 0.92039
published_at 2026-05-12T12:55:00Z
18
value 0.07825
scoring_system epss
scoring_elements 0.92056
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8004
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8005
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
aliases CVE-2018-8040
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va7d-ktp2-m7et
26
url VCID-w42s-4aps-y3c5
vulnerability_id VCID-w42s-4aps-y3c5
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38161
reference_id
reference_type
scores
0
value 0.01167
scoring_system epss
scoring_elements 0.78586
published_at 2026-04-01T12:55:00Z
1
value 0.01167
scoring_system epss
scoring_elements 0.78593
published_at 2026-04-02T12:55:00Z
2
value 0.01167
scoring_system epss
scoring_elements 0.78624
published_at 2026-04-04T12:55:00Z
3
value 0.01167
scoring_system epss
scoring_elements 0.78605
published_at 2026-04-07T12:55:00Z
4
value 0.01167
scoring_system epss
scoring_elements 0.7863
published_at 2026-04-08T12:55:00Z
5
value 0.01167
scoring_system epss
scoring_elements 0.78637
published_at 2026-04-09T12:55:00Z
6
value 0.01167
scoring_system epss
scoring_elements 0.78662
published_at 2026-04-11T12:55:00Z
7
value 0.01167
scoring_system epss
scoring_elements 0.78643
published_at 2026-04-12T12:55:00Z
8
value 0.01167
scoring_system epss
scoring_elements 0.78636
published_at 2026-04-13T12:55:00Z
9
value 0.01167
scoring_system epss
scoring_elements 0.78665
published_at 2026-04-16T12:55:00Z
10
value 0.01167
scoring_system epss
scoring_elements 0.78663
published_at 2026-04-18T12:55:00Z
11
value 0.01167
scoring_system epss
scoring_elements 0.7866
published_at 2026-04-21T12:55:00Z
12
value 0.01167
scoring_system epss
scoring_elements 0.7869
published_at 2026-04-24T12:55:00Z
13
value 0.01167
scoring_system epss
scoring_elements 0.78698
published_at 2026-04-26T12:55:00Z
14
value 0.01167
scoring_system epss
scoring_elements 0.78715
published_at 2026-04-29T12:55:00Z
15
value 0.01167
scoring_system epss
scoring_elements 0.78736
published_at 2026-05-05T12:55:00Z
16
value 0.01167
scoring_system epss
scoring_elements 0.78759
published_at 2026-05-07T12:55:00Z
17
value 0.01167
scoring_system epss
scoring_elements 0.78775
published_at 2026-05-09T12:55:00Z
18
value 0.01167
scoring_system epss
scoring_elements 0.78772
published_at 2026-05-11T12:55:00Z
19
value 0.01167
scoring_system epss
scoring_elements 0.78788
published_at 2026-05-12T12:55:00Z
20
value 0.01167
scoring_system epss
scoring_elements 0.78827
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38161
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-38161
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w42s-4aps-y3c5
27
url VCID-xh97-4sn5-vyfw
vulnerability_id VCID-xh97-4sn5-vyfw
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32567
reference_id
reference_type
scores
0
value 0.07927
scoring_system epss
scoring_elements 0.92013
published_at 2026-04-01T12:55:00Z
1
value 0.07927
scoring_system epss
scoring_elements 0.92019
published_at 2026-04-02T12:55:00Z
2
value 0.07927
scoring_system epss
scoring_elements 0.92027
published_at 2026-04-04T12:55:00Z
3
value 0.07927
scoring_system epss
scoring_elements 0.92032
published_at 2026-04-07T12:55:00Z
4
value 0.07927
scoring_system epss
scoring_elements 0.92044
published_at 2026-04-08T12:55:00Z
5
value 0.07927
scoring_system epss
scoring_elements 0.92047
published_at 2026-04-09T12:55:00Z
6
value 0.07927
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-12T12:55:00Z
7
value 0.07927
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-13T12:55:00Z
8
value 0.07927
scoring_system epss
scoring_elements 0.92066
published_at 2026-04-24T12:55:00Z
9
value 0.07927
scoring_system epss
scoring_elements 0.92063
published_at 2026-04-18T12:55:00Z
10
value 0.07927
scoring_system epss
scoring_elements 0.92061
published_at 2026-04-21T12:55:00Z
11
value 0.07927
scoring_system epss
scoring_elements 0.92064
published_at 2026-04-26T12:55:00Z
12
value 0.07927
scoring_system epss
scoring_elements 0.9206
published_at 2026-04-29T12:55:00Z
13
value 0.07927
scoring_system epss
scoring_elements 0.92072
published_at 2026-05-05T12:55:00Z
14
value 0.07927
scoring_system epss
scoring_elements 0.92085
published_at 2026-05-07T12:55:00Z
15
value 0.07927
scoring_system epss
scoring_elements 0.92093
published_at 2026-05-11T12:55:00Z
16
value 0.07927
scoring_system epss
scoring_elements 0.921
published_at 2026-05-12T12:55:00Z
17
value 0.07927
scoring_system epss
scoring_elements 0.9212
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32567
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32567
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xh97-4sn5-vyfw
28
url VCID-xwdc-hndy-yubc
vulnerability_id VCID-xwdc-hndy-yubc
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9494
reference_id
reference_type
scores
0
value 0.03178
scoring_system epss
scoring_elements 0.87097
published_at 2026-05-14T12:55:00Z
1
value 0.03178
scoring_system epss
scoring_elements 0.86918
published_at 2026-04-02T12:55:00Z
2
value 0.03178
scoring_system epss
scoring_elements 0.86937
published_at 2026-04-04T12:55:00Z
3
value 0.03178
scoring_system epss
scoring_elements 0.8693
published_at 2026-04-07T12:55:00Z
4
value 0.03178
scoring_system epss
scoring_elements 0.8695
published_at 2026-04-08T12:55:00Z
5
value 0.03178
scoring_system epss
scoring_elements 0.86957
published_at 2026-04-09T12:55:00Z
6
value 0.03178
scoring_system epss
scoring_elements 0.86971
published_at 2026-04-11T12:55:00Z
7
value 0.03178
scoring_system epss
scoring_elements 0.86966
published_at 2026-04-12T12:55:00Z
8
value 0.03178
scoring_system epss
scoring_elements 0.8696
published_at 2026-04-13T12:55:00Z
9
value 0.03178
scoring_system epss
scoring_elements 0.86975
published_at 2026-04-16T12:55:00Z
10
value 0.03178
scoring_system epss
scoring_elements 0.86979
published_at 2026-04-18T12:55:00Z
11
value 0.03178
scoring_system epss
scoring_elements 0.86978
published_at 2026-04-21T12:55:00Z
12
value 0.03178
scoring_system epss
scoring_elements 0.87056
published_at 2026-05-09T12:55:00Z
13
value 0.03178
scoring_system epss
scoring_elements 0.87052
published_at 2026-05-11T12:55:00Z
14
value 0.03178
scoring_system epss
scoring_elements 0.87066
published_at 2026-05-12T12:55:00Z
15
value 0.03178
scoring_system epss
scoring_elements 0.86907
published_at 2026-04-01T12:55:00Z
16
value 0.03178
scoring_system epss
scoring_elements 0.87039
published_at 2026-05-07T12:55:00Z
17
value 0.03451
scoring_system epss
scoring_elements 0.87545
published_at 2026-04-24T12:55:00Z
18
value 0.03451
scoring_system epss
scoring_elements 0.87551
published_at 2026-04-26T12:55:00Z
19
value 0.03451
scoring_system epss
scoring_elements 0.8755
published_at 2026-04-29T12:55:00Z
20
value 0.03451
scoring_system epss
scoring_elements 0.87563
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9494
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963629
reference_id 963629
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963629
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2020-9494
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xwdc-hndy-yubc
29
url VCID-zmh1-wmct-uyf7
vulnerability_id VCID-zmh1-wmct-uyf7
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32565
reference_id
reference_type
scores
0
value 0.05675
scoring_system epss
scoring_elements 0.90351
published_at 2026-04-01T12:55:00Z
1
value 0.05675
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-02T12:55:00Z
2
value 0.05675
scoring_system epss
scoring_elements 0.90365
published_at 2026-04-04T12:55:00Z
3
value 0.05675
scoring_system epss
scoring_elements 0.90369
published_at 2026-04-07T12:55:00Z
4
value 0.05675
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-08T12:55:00Z
5
value 0.05675
scoring_system epss
scoring_elements 0.90389
published_at 2026-04-09T12:55:00Z
6
value 0.05675
scoring_system epss
scoring_elements 0.90397
published_at 2026-04-12T12:55:00Z
7
value 0.05675
scoring_system epss
scoring_elements 0.9039
published_at 2026-04-13T12:55:00Z
8
value 0.05675
scoring_system epss
scoring_elements 0.90406
published_at 2026-04-16T12:55:00Z
9
value 0.05675
scoring_system epss
scoring_elements 0.90405
published_at 2026-04-18T12:55:00Z
10
value 0.05675
scoring_system epss
scoring_elements 0.90403
published_at 2026-04-21T12:55:00Z
11
value 0.05675
scoring_system epss
scoring_elements 0.90417
published_at 2026-04-26T12:55:00Z
12
value 0.05675
scoring_system epss
scoring_elements 0.90413
published_at 2026-04-29T12:55:00Z
13
value 0.05675
scoring_system epss
scoring_elements 0.90427
published_at 2026-05-05T12:55:00Z
14
value 0.05675
scoring_system epss
scoring_elements 0.90444
published_at 2026-05-07T12:55:00Z
15
value 0.05675
scoring_system epss
scoring_elements 0.90456
published_at 2026-05-09T12:55:00Z
16
value 0.05675
scoring_system epss
scoring_elements 0.90453
published_at 2026-05-11T12:55:00Z
17
value 0.05675
scoring_system epss
scoring_elements 0.90462
published_at 2026-05-12T12:55:00Z
18
value 0.05675
scoring_system epss
scoring_elements 0.90475
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32565
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
reference_id 990303
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303
fixed_packages
0
url pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
purl pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-41x7-hv4u-byb9
1
vulnerability VCID-4men-293s-3bhn
2
vulnerability VCID-4wwn-74ac-p7dp
3
vulnerability VCID-568b-s8ks-vfa6
4
vulnerability VCID-5781-s1ny-q7ey
5
vulnerability VCID-6bwv-cd3d-mudb
6
vulnerability VCID-73aa-rk27-tye1
7
vulnerability VCID-7nhc-5p2x-t3cj
8
vulnerability VCID-931v-ukcc-6qaa
9
vulnerability VCID-aqt5-2ffy-9bgs
10
vulnerability VCID-b7zx-ywwc-57d9
11
vulnerability VCID-bb5y-kjej-bbfm
12
vulnerability VCID-bdgg-edbf-xfav
13
vulnerability VCID-btm9-vxvc-3qhv
14
vulnerability VCID-c5hc-3jtx-k3a6
15
vulnerability VCID-c675-5njd-63hk
16
vulnerability VCID-cbe5-hhz8-bqbn
17
vulnerability VCID-cscf-sb71-jybq
18
vulnerability VCID-esap-nkps-cfg9
19
vulnerability VCID-fmwc-nmhh-ryaf
20
vulnerability VCID-fq5y-b9yq-nbee
21
vulnerability VCID-hbte-dsw2-y7ad
22
vulnerability VCID-j6r7-ypa1-zybv
23
vulnerability VCID-jabw-thzt-63bb
24
vulnerability VCID-jb1b-9gr2-suez
25
vulnerability VCID-jdjf-3w9k-xbaw
26
vulnerability VCID-k2ks-3t6e-uqgu
27
vulnerability VCID-n66u-b73u-zucb
28
vulnerability VCID-p5f7-uu6r-8bez
29
vulnerability VCID-pxaf-6qxa-77h9
30
vulnerability VCID-rcdg-j23x-xfbn
31
vulnerability VCID-rw58-bnwt-2bam
32
vulnerability VCID-skrs-cynm-r7du
33
vulnerability VCID-t559-a5u6-4ke1
34
vulnerability VCID-u5qg-vszr-9ye2
35
vulnerability VCID-uhqf-tsxe-ayc2
36
vulnerability VCID-uhxq-9bzs-u3fd
37
vulnerability VCID-uy1m-av2n-jybt
38
vulnerability VCID-w42s-4aps-y3c5
39
vulnerability VCID-waer-as81-8fed
40
vulnerability VCID-xh97-4sn5-vyfw
41
vulnerability VCID-xwdc-hndy-yubc
42
vulnerability VCID-xwru-y5m9-gucd
43
vulnerability VCID-zmh1-wmct-uyf7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6
1
url pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
purl pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4738-xk8n-hbac
1
vulnerability VCID-4hs3-be7k-9qe7
2
vulnerability VCID-4uhe-mtbx-nfdu
3
vulnerability VCID-5e1r-3jec-tkhp
4
vulnerability VCID-c62p-6ghw-j3dv
5
vulnerability VCID-eay7-63um-43e9
6
vulnerability VCID-esap-nkps-cfg9
7
vulnerability VCID-jabw-thzt-63bb
8
vulnerability VCID-jb1b-9gr2-suez
9
vulnerability VCID-kjah-am9e-xkev
10
vulnerability VCID-rcdg-j23x-xfbn
11
vulnerability VCID-rw58-bnwt-2bam
12
vulnerability VCID-tevw-8dcp-yfh6
13
vulnerability VCID-ww3t-p3pq-gkhy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1
aliases CVE-2021-32565
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zmh1-wmct-uyf7
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6