{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","type":"deb","namespace":"debian","name":"asterisk","version":"1:16.2.1~dfsg-1+deb10u2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1:22.9.0+dfsg+~cs6.16.60671434-1","latest_non_vulnerable_version":"1:22.9.0+dfsg+~cs6.16.60671434-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64676?format=json","vulnerability_id":"VCID-1qxc-4xk5-2feu","summary":"Asterisk: Asterisk: Arbitrary code execution and file overwrite as root via insecure ast_coredumper file handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23740.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23740.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23740","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02503","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02516","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02517","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23740"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127438","reference_id":"1127438","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127438"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2437723","reference_id":"2437723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2437723"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-xpc6-x892-v83c","reference_id":"GHSA-xpc6-x892-v83c","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-06T19:11:52Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-xpc6-x892-v83c"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2026-23740"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1qxc-4xk5-2feu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96720?format=json","vulnerability_id":"VCID-2qjc-yspn-xydj","summary":"Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47780","reference_id":"","reference_type":"","scores":[{"value":"0.00577","scoring_system":"epss","scoring_elements":"0.68818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00577","scoring_system":"epss","scoring_elements":"0.68847","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00577","scoring_system":"epss","scoring_elements":"0.6877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00577","scoring_system":"epss","scoring_elements":"0.6879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00577","scoring_system":"epss","scoring_elements":"0.68768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00577","scoring_system":"epss","scoring_elements":"0.6882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00577","scoring_system":"epss","scoring_elements":"0.68839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00577","scoring_system":"epss","scoring_elements":"0.68862","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47780"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106530","reference_id":"1106530","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106530"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-c7p6-7mvq-8jq2","reference_id":"GHSA-c7p6-7mvq-8jq2","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T17:24:44Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-c7p6-7mvq-8jq2"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2025-47780"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2qjc-yspn-xydj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94092?format=json","vulnerability_id":"VCID-32hs-eqw2-1kf2","summary":"An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.","references":[{"reference_url":"http://downloads.asterisk.org/pub/security/AST-2019-006.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.asterisk.org/pub/security/AST-2019-006.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18790","reference_id":"","reference_type":"","scores":[{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91746","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91713","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91718","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07418","scoring_system":"epss","scoring_elements":"0.91748","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18790"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html"},{"reference_url":"https://www.asterisk.org/downloads/security-advisories","reference_id":"","reference_type":"","scores":[],"url":"https://www.asterisk.org/downloads/security-advisories"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947381","reference_id":"947381","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947381"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18790","reference_id":"CVE-2019-18790","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18790"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2019-18790"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-32hs-eqw2-1kf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95092?format=json","vulnerability_id":"VCID-34fv-tv5a-tkgw","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23537","reference_id":"","reference_type":"","scores":[{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58981","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58915","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58938","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092","reference_id":"1032092","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092"},{"reference_url":"https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1","reference_id":"d8440f4d711a654b511f50f79c0445b26f9dd1e1","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/"}],"url":"https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w","reference_id":"GHSA-9pfh-r8x4-w26w","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-23537"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-34fv-tv5a-tkgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56274?format=json","vulnerability_id":"VCID-43ff-97jw-hkce","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1131","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14023","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1131"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-v9q8-9j8m-5xwp","reference_id":"GHSA-v9q8-9j8m-5xwp","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/V:C/RE:H/U:Amber"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-24T03:55:15Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-v9q8-9j8m-5xwp"},{"reference_url":"https://security.gentoo.org/glsa/202601-04","reference_id":"GLSA-202601-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202601-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2025-1131"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-43ff-97jw-hkce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31365?format=json","vulnerability_id":"VCID-48pt-6j6q-jbcn","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23608","reference_id":"","reference_type":"","scores":[{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00784","scoring_system":"epss","scoring_elements":"0.73786","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73772","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73814","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Mar/1","reference_id":"1","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Mar/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html","reference_id":"Asterisk-Project-Security-Advisory-AST-2022-005.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html"},{"reference_url":"https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f","reference_id":"db3235953baa56d2fb0e276ca510fefca751643f","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f"},{"reference_url":"https://www.debian.org/security/2022/dsa-5285","reference_id":"dsa-5285","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"https://www.debian.org/security/2022/dsa-5285"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62","reference_id":"GHSA-ffff-m5fm-qm62","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html","reference_id":"msg00035.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html","reference_id":"msg00040.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-23608"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48pt-6j6q-jbcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42496?format=json","vulnerability_id":"VCID-55vv-7jsj-xqeh","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-49294","reference_id":"","reference_type":"","scores":[{"value":"0.17085","scoring_system":"epss","scoring_elements":"0.94971","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17085","scoring_system":"epss","scoring_elements":"0.94973","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17085","scoring_system":"epss","scoring_elements":"0.94976","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17085","scoring_system":"epss","scoring_elements":"0.94985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17085","scoring_system":"epss","scoring_elements":"0.94988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17085","scoring_system":"epss","scoring_elements":"0.94993","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17085","scoring_system":"epss","scoring_elements":"0.94995","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17085","scoring_system":"epss","scoring_elements":"0.94997","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-49294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059032","reference_id":"1059032","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059032"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585942?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r54j-ydjm-4uca"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4"}],"aliases":["CVE-2023-49294"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-55vv-7jsj-xqeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94090?format=json","vulnerability_id":"VCID-5yue-52xt-ryhw","summary":"An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.","references":[{"reference_url":"http://downloads.asterisk.org/pub/security/AST-2019-007.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.asterisk.org/pub/security/AST-2019-007.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18610","reference_id":"","reference_type":"","scores":[{"value":"0.41891","scoring_system":"epss","scoring_elements":"0.97427","published_at":"2026-04-13T12:55:00Z"},{"value":"0.41891","scoring_system":"epss","scoring_elements":"0.97425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.41891","scoring_system":"epss","scoring_elements":"0.97401","published_at":"2026-04-01T12:55:00Z"},{"value":"0.41891","scoring_system":"epss","scoring_elements":"0.97408","published_at":"2026-04-02T12:55:00Z"},{"value":"0.41891","scoring_system":"epss","scoring_elements":"0.97412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.41891","scoring_system":"epss","scoring_elements":"0.97415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.41891","scoring_system":"epss","scoring_elements":"0.97421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.41891","scoring_system":"epss","scoring_elements":"0.97423","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18610"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00038.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html"},{"reference_url":"https://www.asterisk.org/downloads/security-advisories","reference_id":"","reference_type":"","scores":[],"url":"https://www.asterisk.org/downloads/security-advisories"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947377","reference_id":"947377","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947377"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18610","reference_id":"CVE-2019-18610","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18610"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2019-18610"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5yue-52xt-ryhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96800?format=json","vulnerability_id":"VCID-63fe-saga-13ct","summary":"Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 18.26.4 and 18.9-cert17, RTP UDP ports and internal resources can leak due to a lack of session termination. This could result in leaks and resource exhaustion. This issue has been patched in versions 18.26.4 and 18.9-cert17.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-54995","reference_id":"","reference_type":"","scores":[{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76862","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76889","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76894","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76886","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01038","scoring_system":"epss","scoring_elements":"0.77363","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-54995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54995"},{"reference_url":"https://github.com/asterisk/asterisk/commit/0278f5bde14565c6838a6ec39bc21aee0cde56a9","reference_id":"0278f5bde14565c6838a6ec39bc21aee0cde56a9","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-28T18:53:35Z/"}],"url":"https://github.com/asterisk/asterisk/commit/0278f5bde14565c6838a6ec39bc21aee0cde56a9"},{"reference_url":"https://github.com/asterisk/asterisk/pull/1405","reference_id":"1405","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-28T18:53:35Z/"}],"url":"https://github.com/asterisk/asterisk/pull/1405"},{"reference_url":"https://github.com/asterisk/asterisk/pull/1406","reference_id":"1406","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-28T18:53:35Z/"}],"url":"https://github.com/asterisk/asterisk/pull/1406"},{"reference_url":"https://github.com/asterisk/asterisk/commit/eafcd7a451dcd007dddf324ac37dd55a4808338d","reference_id":"eafcd7a451dcd007dddf324ac37dd55a4808338d","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-28T18:53:35Z/"}],"url":"https://github.com/asterisk/asterisk/commit/eafcd7a451dcd007dddf324ac37dd55a4808338d"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-557q-795j-wfx2","reference_id":"GHSA-557q-795j-wfx2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-28T18:53:35Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-557q-795j-wfx2"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2025-54995"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63fe-saga-13ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42485?format=json","vulnerability_id":"VCID-6rhm-xrwe-x7af","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26717","reference_id":"","reference_type":"","scores":[{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61969","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62001","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.6197","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.6202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62025","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26717"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983157","reference_id":"983157","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983157"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-26717"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6rhm-xrwe-x7af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42489?format=json","vulnerability_id":"VCID-7kus-4n4f-myd1","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26498","reference_id":"","reference_type":"","scores":[{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61596","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61619","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-26498"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7kus-4n4f-myd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31358?format=json","vulnerability_id":"VCID-7m8s-6ydk-gbgr","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37706","reference_id":"","reference_type":"","scores":[{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48294","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4829","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48566","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"},{"reference_url":"https://usn.ubuntu.com/6422-2/","reference_id":"USN-6422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-2/"},{"reference_url":"https://usn.ubuntu.com/8122-1/","reference_id":"USN-8122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8122-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-37706"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7m8s-6ydk-gbgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64677?format=json","vulnerability_id":"VCID-8kjy-xtm2-bqan","summary":"Asterisk: Asterisk: Local file disclosure via unsafe XML parsing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23739.json","reference_id":"","reference_type":"","scores":[{"value":"2.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23739.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23739","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14816","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14808","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14948","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23739"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127438","reference_id":"1127438","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127438"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2437909","reference_id":"2437909","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2437909"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-85x7-54wr-vh42","reference_id":"GHSA-85x7-54wr-vh42","reference_type":"","scores":[{"value":"2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-06T17:36:34Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-85x7-54wr-vh42"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2026-23739"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8kjy-xtm2-bqan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42490?format=json","vulnerability_id":"VCID-8pdp-epea-juhj","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26499","reference_id":"","reference_type":"","scores":[{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58287","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.6541","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65493","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65451","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-26499"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8pdp-epea-juhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31363?format=json","vulnerability_id":"VCID-8sys-3sj7-c3h6","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21722","reference_id":"","reference_type":"","scores":[{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64204","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a","reference_id":"22af44e68a0c7d190ac1e25075e1382f77e9397a","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"}],"url":"https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a"},{"reference_url":"https://www.debian.org/security/2022/dsa-5285","reference_id":"dsa-5285","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"}],"url":"https://www.debian.org/security/2022/dsa-5285"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36","reference_id":"GHSA-m66q-q64c-hv36","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"}],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html","reference_id":"msg00035.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-21722"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8sys-3sj7-c3h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94955?format=json","vulnerability_id":"VCID-8yav-jpp1-rfbe","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43299","reference_id":"","reference_type":"","scores":[{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59397","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5943","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59414","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59396","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"},{"reference_url":"https://usn.ubuntu.com/8122-1/","reference_id":"USN-8122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8122-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-43299"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8yav-jpp1-rfbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94044?format=json","vulnerability_id":"VCID-917e-7kp2-y3hw","summary":"res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference.","references":[{"reference_url":"http://downloads.asterisk.org/pub/security/AST-2019-004.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.asterisk.org/pub/security/AST-2019-004.html"},{"reference_url":"http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html"},{"reference_url":"http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15297","reference_id":"","reference_type":"","scores":[{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.82843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.82847","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.82779","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.82795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.82809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.82804","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.8283","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.82836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01814","scoring_system":"epss","scoring_elements":"0.82852","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15297"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Mar/5","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2021/Mar/5"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940060","reference_id":"940060","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940060"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15297","reference_id":"CVE-2019-15297","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15297"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2019-15297"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-917e-7kp2-y3hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31374?format=json","vulnerability_id":"VCID-9at6-bgzv-gue3","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39269","reference_id":"","reference_type":"","scores":[{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44535","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00219","scoring_system":"epss","scoring_elements":"0.44516","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092","reference_id":"1032092","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-37"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-39269"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9at6-bgzv-gue3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31362?format=json","vulnerability_id":"VCID-9f9j-z7y7-sffy","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43845","reference_id":"","reference_type":"","scores":[{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51925","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51965","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52019","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52018","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.5207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52052","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.52036","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-43845"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9f9j-z7y7-sffy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96182?format=json","vulnerability_id":"VCID-9u4p-wdky-a3h1","summary":"Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42365","reference_id":"","reference_type":"","scores":[{"value":"0.3195","scoring_system":"epss","scoring_elements":"0.96809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.3195","scoring_system":"epss","scoring_elements":"0.96812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.3195","scoring_system":"epss","scoring_elements":"0.9681","published_at":"2026-04-09T12:55:00Z"},{"value":"0.3195","scoring_system":"epss","scoring_elements":"0.96795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.3195","scoring_system":"epss","scoring_elements":"0.96796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.3195","scoring_system":"epss","scoring_elements":"0.96801","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42365"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078574","reference_id":"1078574","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078574"},{"reference_url":"https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4","reference_id":"42a2f4ccfa2c7062a15063e765916b3332e34cc4","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T16:38:45Z/"}],"url":"https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4"},{"reference_url":"https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8","reference_id":"7a0090325bfa9d778a39ae5f7d0a98109e4651c8","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T16:38:45Z/"}],"url":"https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8"},{"reference_url":"https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71","reference_id":"b4063bf756272254b160b6d1bd6e9a3f8e16cc71","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T16:38:45Z/"}],"url":"https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71"},{"reference_url":"https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993","reference_id":"bbe68db10ab8a80c29db383e4dfe14f6eafaf993","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T16:38:45Z/"}],"url":"https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993"},{"reference_url":"https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2","reference_id":"faddd99f2b9408b524e5eb8a01589fe1fa282df2","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T16:38:45Z/"}],"url":"https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44","reference_id":"GHSA-c4cg-9275-6w44","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T16:38:45Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44"},{"reference_url":"https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426","reference_id":"manager.c#L6426","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T16:38:45Z/"}],"url":"https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426"},{"reference_url":"https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426","reference_id":"manager.c#L6426","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T16:38:45Z/"}],"url":"https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2024-42365"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9u4p-wdky-a3h1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47565?format=json","vulnerability_id":"VCID-ap3n-99gn-aucs","summary":"A vulnerability has been discovered in PJSIP, which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27585","reference_id":"","reference_type":"","scores":[{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.6572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.6575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.6577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.6578","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65801","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00495","scoring_system":"epss","scoring_elements":"0.65757","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27585"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036697","reference_id":"1036697","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036697"},{"reference_url":"https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5","reference_id":"d1c5e4da5bae7f220bc30719888bb389c905c0c5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"}],"url":"https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5"},{"reference_url":"https://www.debian.org/security/2023/dsa-5438","reference_id":"dsa-5438","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"}],"url":"https://www.debian.org/security/2023/dsa-5438"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4","reference_id":"GHSA-p6g5-v97c-w5q4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr","reference_id":"GHSA-q9cp-8wcq-7pfr","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr"},{"reference_url":"https://security.gentoo.org/glsa/202409-05","reference_id":"GLSA-202409-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-05"},{"reference_url":"https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm","reference_id":"group__PJ__DNS__RESOLVER.htm","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"}],"url":"https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"},{"reference_url":"https://usn.ubuntu.com/6422-2/","reference_id":"USN-6422-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2023-27585"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ap3n-99gn-aucs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42494?format=json","vulnerability_id":"VCID-b4z5-5hbq-5ka8","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42706","reference_id":"","reference_type":"","scores":[{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74208","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74214","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74228","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.7425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74231","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0081","scoring_system":"epss","scoring_elements":"0.74224","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"},{"reference_url":"https://downloads.asterisk.org/pub/security/AST-2022-009.html","reference_id":"AST-2022-009.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/"}],"url":"https://downloads.asterisk.org/pub/security/AST-2022-009.html"},{"reference_url":"https://www.debian.org/security/2023/dsa-5358","reference_id":"dsa-5358","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/"}],"url":"https://www.debian.org/security/2023/dsa-5358"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:23:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-42706"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4z5-5hbq-5ka8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42497?format=json","vulnerability_id":"VCID-bk8r-brkr-bqc6","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-49786","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26672","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26693","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-49786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059033","reference_id":"1059033","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059033"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/24","reference_id":"24","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/24"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/15/7","reference_id":"7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/15/7"},{"reference_url":"http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html","reference_id":"Asterisk-20.1.0-Denial-Of-Service.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"}],"url":"http://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html"},{"reference_url":"https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05","reference_id":"d7d7764cb07c8a1872804321302ef93bf62cba05","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"}],"url":"https://github.com/asterisk/asterisk/commit/d7d7764cb07c8a1872804321302ef93bf62cba05"},{"reference_url":"https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race","reference_id":"ES2023-01-asterisk-dtls-hello-race","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"}],"url":"https://github.com/EnableSecurity/advisories/tree/master/ES2023-01-asterisk-dtls-hello-race"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq","reference_id":"GHSA-hxj9-xwr8-w8pq","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-hxj9-xwr8-w8pq"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-08T14:19:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585942?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r54j-ydjm-4uca"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4"}],"aliases":["CVE-2023-49786"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bk8r-brkr-bqc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42495?format=json","vulnerability_id":"VCID-bknu-abgc-bugw","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37457","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22375","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22265","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059303","reference_id":"1059303","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059303"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585942?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r54j-ydjm-4uca"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4"}],"aliases":["CVE-2023-37457"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bknu-abgc-bugw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94957?format=json","vulnerability_id":"VCID-byqv-c5jp-6ybg","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43301","reference_id":"","reference_type":"","scores":[{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65068","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65118","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68284","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68238","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"},{"reference_url":"https://usn.ubuntu.com/8122-1/","reference_id":"USN-8122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8122-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-43301"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byqv-c5jp-6ybg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42492?format=json","vulnerability_id":"VCID-cupt-538a-z3fp","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37325","reference_id":"","reference_type":"","scores":[{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.7154","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.7158","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.7159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0068","scoring_system":"epss","scoring_elements":"0.71567","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"},{"reference_url":"https://downloads.asterisk.org/pub/security/AST-2022-007.html","reference_id":"AST-2022-007.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/"}],"url":"https://downloads.asterisk.org/pub/security/AST-2022-007.html"},{"reference_url":"https://www.debian.org/security/2023/dsa-5358","reference_id":"dsa-5358","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/"}],"url":"https://www.debian.org/security/2023/dsa-5358"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:38:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-37325"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cupt-538a-z3fp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31364?format=json","vulnerability_id":"VCID-ddpb-zwva-rfc5","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21723","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64457","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64488","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64495","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64487","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896","reference_id":"077b465c33f0aec05a49cd2ca456f9a1b112e896","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Mar/2","reference_id":"2","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Mar/2"},{"reference_url":"http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html","reference_id":"Asterisk-Project-Security-Advisory-AST-2022-006.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html"},{"reference_url":"https://www.debian.org/security/2022/dsa-5285","reference_id":"dsa-5285","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"https://www.debian.org/security/2022/dsa-5285"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm","reference_id":"GHSA-7fw8-54cv-r7pm","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html","reference_id":"msg00035.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-21723"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ddpb-zwva-rfc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31357?format=json","vulnerability_id":"VCID-epzp-dpmr-33df","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32686","reference_id":"","reference_type":"","scores":[{"value":"0.02081","scoring_system":"epss","scoring_elements":"0.83919","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02081","scoring_system":"epss","scoring_elements":"0.83934","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02769","scoring_system":"epss","scoring_elements":"0.85996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02769","scoring_system":"epss","scoring_elements":"0.85995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02769","scoring_system":"epss","scoring_elements":"0.86015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02769","scoring_system":"epss","scoring_elements":"0.86025","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02769","scoring_system":"epss","scoring_elements":"0.86039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02769","scoring_system":"epss","scoring_elements":"0.86037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02769","scoring_system":"epss","scoring_elements":"0.86032","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991931","reference_id":"991931","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991931"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://usn.ubuntu.com/8122-1/","reference_id":"USN-8122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8122-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-32686"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-epzp-dpmr-33df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31361?format=json","vulnerability_id":"VCID-f5qc-tsbr-1yap","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43804","reference_id":"","reference_type":"","scores":[{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53266","published_at":"2026-04-01T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.5329","published_at":"2026-04-02T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53285","published_at":"2026-04-07T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53332","published_at":"2026-04-09T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53383","published_at":"2026-04-11T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.5335","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-43804"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f5qc-tsbr-1yap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42486?format=json","vulnerability_id":"VCID-fjzf-5rtw-rqfj","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26906","reference_id":"","reference_type":"","scores":[{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74179","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74217","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74253","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74227","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983159","reference_id":"983159","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983159"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-26906"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fjzf-5rtw-rqfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94545?format=json","vulnerability_id":"VCID-gkcp-1zz6-tfb5","summary":"A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-28327","reference_id":"","reference_type":"","scores":[{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.85963","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.85974","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.8599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.85989","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.86008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.86018","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.86032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.8603","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02764","scoring_system":"epss","scoring_elements":"0.86026","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-28327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28327"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974712","reference_id":"974712","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974712"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2020-28327"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gkcp-1zz6-tfb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96268?format=json","vulnerability_id":"VCID-gy3u-c6dc-sbbn","summary":"An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53566","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15466","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15603","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15567","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15461","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53566"},{"reference_url":"https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616","reference_id":"e7c0f44ffb38c00320aa1a6d98bee616","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:37:51Z/"}],"url":"https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616"},{"reference_url":"https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556","reference_id":"manager.c#L2556","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:37:51Z/"}],"url":"https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2024-53566"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gy3u-c6dc-sbbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42488?format=json","vulnerability_id":"VCID-h193-vjhb-j3a3","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32558","reference_id":"","reference_type":"","scores":[{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86214","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86242","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86286","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02875","scoring_system":"epss","scoring_elements":"0.86279","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991710","reference_id":"991710","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991710"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-32558"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h193-vjhb-j3a3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31367?format=json","vulnerability_id":"VCID-hj93-7z1r-vkfk","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24763","reference_id":"","reference_type":"","scores":[{"value":"0.01403","scoring_system":"epss","scoring_elements":"0.80395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01403","scoring_system":"epss","scoring_elements":"0.80416","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01403","scoring_system":"epss","scoring_elements":"0.80405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01403","scoring_system":"epss","scoring_elements":"0.80434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01403","scoring_system":"epss","scoring_elements":"0.80444","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01403","scoring_system":"epss","scoring_elements":"0.80463","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01403","scoring_system":"epss","scoring_elements":"0.80448","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01403","scoring_system":"epss","scoring_elements":"0.80441","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976","reference_id":"1014976","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-24763"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hj93-7z1r-vkfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94575?format=json","vulnerability_id":"VCID-huqt-1fv6-67cz","summary":"An issue was discovered in res_pjsip_diversion.c in Sangoma Asterisk before 13.38.0, 14.x through 16.x before 16.15.0, 17.x before 17.9.0, and 18.x before 18.1.0. A crash can occur when a SIP message is received with a History-Info header that contains a tel-uri, or when a SIP 181 response is received that contains a tel-uri in the Diversion header.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35652","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29937","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30033","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29945","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35652"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979372","reference_id":"979372","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979372"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2020-35652"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-huqt-1fv6-67cz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31371?format=json","vulnerability_id":"VCID-n6mj-v1nc-hke9","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24793","reference_id":"","reference_type":"","scores":[{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68469","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68519","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.6855","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68518","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976","reference_id":"1014976","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a","reference_id":"9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"}],"url":"https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a"},{"reference_url":"https://www.debian.org/security/2022/dsa-5285","reference_id":"dsa-5285","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"}],"url":"https://www.debian.org/security/2022/dsa-5285"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4","reference_id":"GHSA-p6g5-v97c-w5q4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"}],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html","reference_id":"msg00047.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-24793"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n6mj-v1nc-hke9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94959?format=json","vulnerability_id":"VCID-nf5d-nejq-mkd9","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43303","reference_id":"","reference_type":"","scores":[{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63734","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67167","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67122","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"},{"reference_url":"https://usn.ubuntu.com/8122-1/","reference_id":"USN-8122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8122-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-43303"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nf5d-nejq-mkd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31372?format=json","vulnerability_id":"VCID-ngds-k5mh-t3ae","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31031","reference_id":"","reference_type":"","scores":[{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72462","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72438","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72511","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72494","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72484","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017004","reference_id":"1017004","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017004"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017005","reference_id":"1017005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017005"},{"reference_url":"https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202","reference_id":"450baca94f475345542c6953832650c390889202","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"}],"url":"https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202"},{"reference_url":"https://www.debian.org/security/2023/dsa-5358","reference_id":"dsa-5358","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"}],"url":"https://www.debian.org/security/2023/dsa-5358"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj","reference_id":"GHSA-26j7-ww69-c4qj","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"}],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-31031"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngds-k5mh-t3ae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97012?format=json","vulnerability_id":"VCID-phb4-xaj7-byg2","summary":"Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the asterisk/contrib/scripts/ast_coredumper runs as root, as noted by the NOTES tag on line 689 of the ast_coredumper file. The script will source the contents of /etc/asterisk/ast_debug_tools.conf, which resides in a folder that is writeable by the asterisk user:group. Due to the /etc/asterisk/ast_debug_tools.conf file following bash semantics and it being loaded; an attacker with write permissions may add or modify the file such that when the root ast_coredumper is run; it would source and thereby execute arbitrary bash code found in the /etc/asterisk/ast_debug_tools.conf. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23741","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10373","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10245","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10412","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23741"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127438","reference_id":"1127438","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127438"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-rvch-3jmx-3jf3","reference_id":"GHSA-rvch-3jmx-3jf3","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-06T17:22:49Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-rvch-3jmx-3jf3"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2026-23741"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-phb4-xaj7-byg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95660?format=json","vulnerability_id":"VCID-pmte-bc34-pfcv","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38703","reference_id":"","reference_type":"","scores":[{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.5137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51424","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51465","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51444","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51384","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51411","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49786"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059303","reference_id":"1059303","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059303"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059307","reference_id":"1059307","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059307"},{"reference_url":"https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d","reference_id":"6dc9b8c181aff39845f02b4626e0812820d4ef0d","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-19T18:46:16Z/"}],"url":"https://github.com/pjsip/pjproject/commit/6dc9b8c181aff39845f02b4626e0812820d4ef0d"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66","reference_id":"GHSA-f76w-fh7c-pc66","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-19T18:46:16Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-19T18:46:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00019.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585942?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r54j-ydjm-4uca"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4"}],"aliases":["CVE-2023-38703"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pmte-bc34-pfcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95093?format=json","vulnerability_id":"VCID-psbg-wv2x-w7ba","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23547","reference_id":"","reference_type":"","scores":[{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60308","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60277","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60327","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6033","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092","reference_id":"1032092","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092"},{"reference_url":"https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36","reference_id":"bc4812d31a67d5e2f973fbfaf950d6118226cf36","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/"}],"url":"https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w","reference_id":"GHSA-9pfh-r8x4-w26w","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-cxwq-5g9x-x7fr","reference_id":"GHSA-cxwq-5g9x-x7fr","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-cxwq-5g9x-x7fr"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-23547"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psbg-wv2x-w7ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96183?format=json","vulnerability_id":"VCID-qcqe-63ev-f7gv","summary":"Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To receive a patch, users should upgrade to one of the following versions: 18.24.3, 20.9.3, 21.4.3, certified-18.9-cert12, certified-20.7-cert2. Two workarounds are available. Disable res_resolver_unbound by setting `noload = res_resolver_unbound.so` in modules.conf, or set `rewrite_contact = yes` on all PJSIP endpoints. NOTE: This may not be appropriate for all Asterisk configurations.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42491","reference_id":"","reference_type":"","scores":[{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76545","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76513","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-42491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42491"},{"reference_url":"https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4","reference_id":"42a2f4ccfa2c7062a15063e765916b3332e34cc4","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T18:48:24Z/"}],"url":"https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4"},{"reference_url":"https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742","reference_id":"4f01669c7c41c9184f3cce9a3cf1b2ebf6201742","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T18:48:24Z/"}],"url":"https://github.com/asterisk/asterisk/commit/4f01669c7c41c9184f3cce9a3cf1b2ebf6201742"},{"reference_url":"https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2","reference_id":"50bf8d4d3064930d28ecf1ce3397b14574d514d2","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T18:48:24Z/"}],"url":"https://github.com/asterisk/asterisk/commit/50bf8d4d3064930d28ecf1ce3397b14574d514d2"},{"reference_url":"https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8","reference_id":"7a0090325bfa9d778a39ae5f7d0a98109e4651c8","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T18:48:24Z/"}],"url":"https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8"},{"reference_url":"https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0","reference_id":"a15050650abf09c10a3c135fab148220cd41d3a0","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T18:48:24Z/"}],"url":"https://github.com/asterisk/asterisk/commit/a15050650abf09c10a3c135fab148220cd41d3a0"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9","reference_id":"GHSA-v428-g3cw-7hv9","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T18:48:24Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-v428-g3cw-7hv9"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2024-42491"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qcqe-63ev-f7gv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42481?format=json","vulnerability_id":"VCID-r8b9-jcqa-xyb2","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35776","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24665","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24589","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35776"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983158","reference_id":"983158","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983158"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2020-35776"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8b9-jcqa-xyb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31370?format=json","vulnerability_id":"VCID-tqwd-ffwc-mkd1","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24792","reference_id":"","reference_type":"","scores":[{"value":"0.01621","scoring_system":"epss","scoring_elements":"0.81774","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01621","scoring_system":"epss","scoring_elements":"0.81797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01621","scoring_system":"epss","scoring_elements":"0.81795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01621","scoring_system":"epss","scoring_elements":"0.81821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01621","scoring_system":"epss","scoring_elements":"0.81828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01621","scoring_system":"epss","scoring_elements":"0.81847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01621","scoring_system":"epss","scoring_elements":"0.81835","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01621","scoring_system":"epss","scoring_elements":"0.81829","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976","reference_id":"1014976","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"},{"reference_url":"https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213","reference_id":"947bc1ee6d05be10204b918df75a503415fd3213","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"}],"url":"https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213"},{"reference_url":"https://www.debian.org/security/2022/dsa-5285","reference_id":"dsa-5285","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"}],"url":"https://www.debian.org/security/2022/dsa-5285"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799","reference_id":"GHSA-rwgw-vwxg-q799","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"}],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html","reference_id":"msg00047.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-24792"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tqwd-ffwc-mkd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94544?format=json","vulnerability_id":"VCID-tyh4-14zn-63ez","summary":"An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-28242","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61018","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61153","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61174","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.6116","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61141","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-28242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28242"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974713","reference_id":"974713","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974713"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2020-28242"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tyh4-14zn-63ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96719?format=json","vulnerability_id":"VCID-u91b-9huy-43hn","summary":"Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47779","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51324","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51338","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51279","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51264","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51319","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-47779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47779"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106528","reference_id":"1106528","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106528"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw","reference_id":"GHSA-2grh-7mhv-fcfw","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-22T17:25:58Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw"},{"reference_url":"https://github.com/asterisk/asterisk/blob/master/configs/samples/pjsip.conf.sample","reference_id":"pjsip.conf.sample","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-22T17:25:58Z/"}],"url":"https://github.com/asterisk/asterisk/blob/master/configs/samples/pjsip.conf.sample"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2025-47779"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u91b-9huy-43hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95038?format=json","vulnerability_id":"VCID-v7ev-jtsg-cqdg","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-46837","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32972","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32965","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32981","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018073","reference_id":"1018073","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018073"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-46837"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ev-jtsg-cqdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31373?format=json","vulnerability_id":"VCID-vwf4-v4ve-4yfh","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39244","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.555","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5553","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55539","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55519","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55502","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"},{"reference_url":"https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae","reference_id":"c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"}],"url":"https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae"},{"reference_url":"https://www.debian.org/security/2023/dsa-5358","reference_id":"dsa-5358","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"}],"url":"https://www.debian.org/security/2023/dsa-5358"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj","reference_id":"GHSA-fq45-m3f7-3mhj","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"}],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-39244"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwf4-v4ve-4yfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31369?format=json","vulnerability_id":"VCID-w9ce-m3x8-n3ak","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24786","reference_id":"","reference_type":"","scores":[{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72929","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72948","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72962","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72975","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.7298","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.72973","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976","reference_id":"1014976","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-37"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-24786"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w9ce-m3x8-n3ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93961?format=json","vulnerability_id":"VCID-x2gp-mft6-1yhy","summary":"An issue was discovered in Asterisk Open Source through 13.27.0, 14.x and 15.x through 15.7.2, and 16.x through 16.4.0, and Certified Asterisk through 13.21-cert3. A pointer dereference in chan_sip while handling SDP negotiation allows an attacker to crash Asterisk when handling an SDP answer to an outgoing T.38 re-invite. To exploit this vulnerability an attacker must cause the chan_sip module to send a T.38 re-invite request to them. Upon receipt, the attacker must send an SDP answer containing both a T.38 UDPTL stream and another media stream containing only a codec (which is not permitted according to the chan_sip configuration).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-13161","reference_id":"","reference_type":"","scores":[{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84257","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84287","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84289","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.8431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84334","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84326","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84323","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-13161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13161"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931981","reference_id":"931981","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931981"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2019-13161"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x2gp-mft6-1yhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93948?format=json","vulnerability_id":"VCID-xbe4-uvqu-6kf7","summary":"Buffer overflow in res_pjsip_messaging in Digium Asterisk versions 13.21-cert3, 13.27.0, 15.7.2, 16.4.0 and earlier allows remote authenticated users to crash Asterisk by sending a specially crafted SIP MESSAGE message.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12827","reference_id":"","reference_type":"","scores":[{"value":"0.1959","scoring_system":"epss","scoring_elements":"0.95377","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1959","scoring_system":"epss","scoring_elements":"0.95386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1959","scoring_system":"epss","scoring_elements":"0.95392","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1959","scoring_system":"epss","scoring_elements":"0.95397","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1959","scoring_system":"epss","scoring_elements":"0.95404","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1959","scoring_system":"epss","scoring_elements":"0.95406","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1959","scoring_system":"epss","scoring_elements":"0.95411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1959","scoring_system":"epss","scoring_elements":"0.95413","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-12827"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12827","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12827"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931980","reference_id":"931980","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931980"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2019-12827"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xbe4-uvqu-6kf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31368?format=json","vulnerability_id":"VCID-y6sx-xqsh-wbcg","summary":"Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24764","reference_id":"","reference_type":"","scores":[{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76209","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76281","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76258","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976","reference_id":"1014976","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00","reference_id":"560a1346f87aabe126509bb24930106dea292b00","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"}],"url":"https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00"},{"reference_url":"https://www.debian.org/security/2022/dsa-5285","reference_id":"dsa-5285","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"}],"url":"https://www.debian.org/security/2022/dsa-5285"},{"reference_url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m","reference_id":"GHSA-f5qg-pqcg-765m","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"}],"url":"https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m"},{"reference_url":"https://security.gentoo.org/glsa/202210-37","reference_id":"GLSA-202210-37","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"}],"url":"https://security.gentoo.org/glsa/202210-37"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html","reference_id":"msg00035.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html","reference_id":"msg00038.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-24764"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y6sx-xqsh-wbcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97011?format=json","vulnerability_id":"VCID-ytty-tbs1-ffc7","summary":"Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23738","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13564","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13678","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13648","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23738"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127438","reference_id":"1127438","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127438"},{"reference_url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-v6hp-wh3r-cwxh","reference_id":"GHSA-v6hp-wh3r-cwxh","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-06T17:43:40Z/"}],"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-v6hp-wh3r-cwxh"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585943?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1060958?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1"}],"aliases":["CVE-2026-23738"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ytty-tbs1-ffc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94956?format=json","vulnerability_id":"VCID-yx1m-ayfg-ryc3","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43300","reference_id":"","reference_type":"","scores":[{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65068","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65118","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68284","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68238","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"},{"reference_url":"https://usn.ubuntu.com/8122-1/","reference_id":"USN-8122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8122-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-43300"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yx1m-ayfg-ryc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42491?format=json","vulnerability_id":"VCID-z3fq-m317-ckb8","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26651","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6297","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62958","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-26651"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z3fq-m317-ckb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42493?format=json","vulnerability_id":"VCID-zabf-adce-sqde","summary":"Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42705","reference_id":"","reference_type":"","scores":[{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.8146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81482","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81507","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.81533","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01567","scoring_system":"epss","scoring_elements":"0.8152","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"},{"reference_url":"https://downloads.asterisk.org/pub/security/AST-2022-008.html","reference_id":"AST-2022-008.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/"}],"url":"https://downloads.asterisk.org/pub/security/AST-2022-008.html"},{"reference_url":"https://www.debian.org/security/2023/dsa-5358","reference_id":"dsa-5358","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/"}],"url":"https://www.debian.org/security/2023/dsa-5358"},{"reference_url":"https://security.gentoo.org/glsa/202412-03","reference_id":"GLSA-202412-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-03"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-24T14:25:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2022-42705"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zabf-adce-sqde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94958?format=json","vulnerability_id":"VCID-zxkf-88k3-3qcn","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43302","reference_id":"","reference_type":"","scores":[{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.5817","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61873","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.6196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0042","scoring_system":"epss","scoring_elements":"0.61928","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998","reference_id":"1014998","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"},{"reference_url":"https://usn.ubuntu.com/6422-1/","reference_id":"USN-6422-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6422-1/"},{"reference_url":"https://usn.ubuntu.com/8122-1/","reference_id":"USN-8122-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8122-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049738?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-ytty-tbs1-ffc7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u3"}],"aliases":["CVE-2021-43302"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxkf-88k3-3qcn"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34031?format=json","vulnerability_id":"VCID-7ner-5xz7-93gz","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"http://downloads.asterisk.org/pub/security/AST-2018-008.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.asterisk.org/pub/security/AST-2018-008.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12227","reference_id":"","reference_type":"","scores":[{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77577","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.7761","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.7762","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77653","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7286"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-27818","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-27818"},{"reference_url":"https://www.debian.org/security/2018/dsa-4320","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4320"},{"reference_url":"http://www.securityfocus.com/bid/104455","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104455"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902954","reference_id":"902954","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902954"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.18:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.18:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.18:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.18:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.18:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.18:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.18:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.18:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.18:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12227","reference_id":"CVE-2018-12227","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12227"},{"reference_url":"https://security.gentoo.org/glsa/201811-11","reference_id":"GLSA-201811-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037079?format=json","purl":"pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%2Bdeb9u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%252Bdeb9u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2018-12227"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ner-5xz7-93gz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34027?format=json","vulnerability_id":"VCID-8qy8-gk53-eufc","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"http://downloads.digium.com/pub/security/AST-2017-010.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.digium.com/pub/security/AST-2017-010.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16671","reference_id":"","reference_type":"","scores":[{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.87841","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.87842","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.87783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.87794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.87805","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.87808","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.8783","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.87836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03635","scoring_system":"epss","scoring_elements":"0.87848","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16671"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-27337","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-27337"},{"reference_url":"https://www.debian.org/security/2017/dsa-4076","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4076"},{"reference_url":"http://www.securityfocus.com/bid/101760","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101760"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881257","reference_id":"881257","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881257"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16671","reference_id":"CVE-2017-16671","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16671"},{"reference_url":"https://security.gentoo.org/glsa/201811-11","reference_id":"GLSA-201811-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-11"},{"reference_url":"https://usn.ubuntu.com/USN-4814-1/","reference_id":"USN-USN-4814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4814-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-16671"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8qy8-gk53-eufc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58862?format=json","vulnerability_id":"VCID-a2n5-xpy5-gyfh","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which allows remote execution of arbitrary shell commands.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14100","reference_id":"","reference_type":"","scores":[{"value":"0.34964","scoring_system":"epss","scoring_elements":"0.96995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.34964","scoring_system":"epss","scoring_elements":"0.97003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.34964","scoring_system":"epss","scoring_elements":"0.97007","published_at":"2026-04-04T12:55:00Z"},{"value":"0.34964","scoring_system":"epss","scoring_elements":"0.97008","published_at":"2026-04-07T12:55:00Z"},{"value":"0.34964","scoring_system":"epss","scoring_elements":"0.97018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.34964","scoring_system":"epss","scoring_elements":"0.97019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.34964","scoring_system":"epss","scoring_elements":"0.97021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.34964","scoring_system":"epss","scoring_elements":"0.97023","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14100"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873908","reference_id":"873908","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873908"},{"reference_url":"https://security.gentoo.org/glsa/201710-29","reference_id":"GLSA-201710-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-29"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035945?format=json","purl":"pkg:deb/debian/asterisk@1:11.13.1~dfsg-2%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-2r38-yjx6-uuae"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6jv8-3wch-wfew"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-7tjs-ybpe-r7hg"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8shw-ev6h-dqgh"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-ay1n-kp3k-37db"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bbhx-pe8h-fubn"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-ebcm-kjvz-73cz"},{"vulnerability":"VCID-edp8-yh2h-xuck"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f1y5-37zk-x3ey"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-fz7z-xttk-13by"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-jwaj-b8n5-bbcx"},{"vulnerability":"VCID-k1zu-wpsb-wyh3"},{"vulnerability":"VCID-m27d-dqzg-w7gr"},{"vulnerability":"VCID-mcfv-fuk8-cqaq"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rb5h-mvxt-7qhv"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-sqgd-ykvk-2qay"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"},{"vulnerability":"VCID-zzpx-gwmv-sfbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:11.13.1~dfsg-2%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037079?format=json","purl":"pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%2Bdeb9u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%252Bdeb9u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-14100"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a2n5-xpy5-gyfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58863?format=json","vulnerability_id":"VCID-dpra-jbea-4fcy","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which allows remote execution of arbitrary shell commands.","references":[{"reference_url":"http://downloads.asterisk.org/pub/security/AST-2017-008.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.asterisk.org/pub/security/AST-2017-008.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14603","reference_id":"","reference_type":"","scores":[{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.7302","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.7303","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.7305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73025","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73099","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14603"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-27274","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-27274"},{"reference_url":"http://www.debian.org/security/2017/dsa-3990","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3990"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876328","reference_id":"876328","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876328"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.11.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.12.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.13.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.0:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.15.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.15.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.16.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.17.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.18.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.19.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.20.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.21.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.21.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.22.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.22.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.22.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.23.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.23.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.23.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.24.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.24.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.24.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.25.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.25.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.25.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.4.0:rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.6.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.6.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.7.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.7.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.9.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.9.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:11.9.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.0:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.0:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.10.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.1.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.14.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.14.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.14.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.14.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.14.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.14.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.15.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.15.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.15.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.16.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.16.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.16.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.16.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.16.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.16.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.17.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.17.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.17.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.2.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.3.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.6.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.7.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.7.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.8.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:13.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.3.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.3.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.3.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.3.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.3.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.3.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.4.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.4.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.6.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:14.6.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:14.6.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert14_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:11.6:cert9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14603","reference_id":"CVE-2017-14603","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14603"},{"reference_url":"https://security.gentoo.org/glsa/201710-29","reference_id":"GLSA-201710-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-29"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035945?format=json","purl":"pkg:deb/debian/asterisk@1:11.13.1~dfsg-2%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-2r38-yjx6-uuae"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6jv8-3wch-wfew"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-7tjs-ybpe-r7hg"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8shw-ev6h-dqgh"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-ay1n-kp3k-37db"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bbhx-pe8h-fubn"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-ebcm-kjvz-73cz"},{"vulnerability":"VCID-edp8-yh2h-xuck"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f1y5-37zk-x3ey"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-fz7z-xttk-13by"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-jwaj-b8n5-bbcx"},{"vulnerability":"VCID-k1zu-wpsb-wyh3"},{"vulnerability":"VCID-m27d-dqzg-w7gr"},{"vulnerability":"VCID-mcfv-fuk8-cqaq"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rb5h-mvxt-7qhv"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-sqgd-ykvk-2qay"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"},{"vulnerability":"VCID-zzpx-gwmv-sfbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:11.13.1~dfsg-2%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037079?format=json","purl":"pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%2Bdeb9u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%252Bdeb9u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-14603"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dpra-jbea-4fcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70420?format=json","vulnerability_id":"VCID-eund-5mfa-9kbn","summary":"security update","references":[{"reference_url":"http://downloads.digium.com/pub/security/AST-2017-013.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.digium.com/pub/security/AST-2017-013.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17090","reference_id":"","reference_type":"","scores":[{"value":"0.80582","scoring_system":"epss","scoring_elements":"0.99136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.80582","scoring_system":"epss","scoring_elements":"0.99135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.80582","scoring_system":"epss","scoring_elements":"0.99126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.80582","scoring_system":"epss","scoring_elements":"0.99128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.80582","scoring_system":"epss","scoring_elements":"0.9913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.80582","scoring_system":"epss","scoring_elements":"0.99133","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17090"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-27452","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-27452"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00028.html"},{"reference_url":"https://www.debian.org/security/2017/dsa-4076","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4076"},{"reference_url":"https://www.exploit-db.com/exploits/43992/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/43992/"},{"reference_url":"http://www.securityfocus.com/bid/102023","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102023"},{"reference_url":"http://www.securitytracker.com/id/1039948","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039948"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883342","reference_id":"883342","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883342"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17090","reference_id":"CVE-2017-17090","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17090"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43992.py","reference_id":"CVE-2017-17090;AST-2017-01","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43992.py"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035945?format=json","purl":"pkg:deb/debian/asterisk@1:11.13.1~dfsg-2%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-2r38-yjx6-uuae"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6jv8-3wch-wfew"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-7tjs-ybpe-r7hg"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8shw-ev6h-dqgh"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-ay1n-kp3k-37db"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bbhx-pe8h-fubn"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-ebcm-kjvz-73cz"},{"vulnerability":"VCID-edp8-yh2h-xuck"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f1y5-37zk-x3ey"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-fz7z-xttk-13by"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-jwaj-b8n5-bbcx"},{"vulnerability":"VCID-k1zu-wpsb-wyh3"},{"vulnerability":"VCID-m27d-dqzg-w7gr"},{"vulnerability":"VCID-mcfv-fuk8-cqaq"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rb5h-mvxt-7qhv"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-sqgd-ykvk-2qay"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"},{"vulnerability":"VCID-zzpx-gwmv-sfbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:11.13.1~dfsg-2%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037079?format=json","purl":"pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%2Bdeb9u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%252Bdeb9u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-17090"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eund-5mfa-9kbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93185?format=json","vulnerability_id":"VCID-fndq-j9d2-afed","summary":"A Remote Crash issue was discovered in Asterisk Open Source 13.x before 13.18.4, 14.x before 14.7.4, and 15.x before 15.1.4 and Certified Asterisk before 13.13-cert9. Certain compound RTCP packets cause a crash in the RTCP Stack.","references":[{"reference_url":"http://downloads.digium.com/pub/security/AST-2017-012.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.digium.com/pub/security/AST-2017-012.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17664","reference_id":"","reference_type":"","scores":[{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.79547","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.79556","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.79499","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.79506","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.79528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.79515","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.79543","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.7955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01276","scoring_system":"epss","scoring_elements":"0.79572","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17664"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-27382","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-27382"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-27429","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-27429"},{"reference_url":"https://www.debian.org/security/2017/dsa-4076","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4076"},{"reference_url":"http://www.securityfocus.com/bid/102201","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102201"},{"reference_url":"http://www.securitytracker.com/id/1040009","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040009"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884345","reference_id":"884345","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884345"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert1_rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13:cert8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17664","reference_id":"CVE-2017-17664","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17664"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-17664"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fndq-j9d2-afed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73685?format=json","vulnerability_id":"VCID-ggu9-8qd1-4ffx","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7286","reference_id":"","reference_type":"","scores":[{"value":"0.54632","scoring_system":"epss","scoring_elements":"0.98016","published_at":"2026-04-01T12:55:00Z"},{"value":"0.54632","scoring_system":"epss","scoring_elements":"0.98021","published_at":"2026-04-02T12:55:00Z"},{"value":"0.54632","scoring_system":"epss","scoring_elements":"0.98023","published_at":"2026-04-04T12:55:00Z"},{"value":"0.54632","scoring_system":"epss","scoring_elements":"0.98024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.54632","scoring_system":"epss","scoring_elements":"0.98028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.54632","scoring_system":"epss","scoring_elements":"0.98029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.54632","scoring_system":"epss","scoring_elements":"0.98034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.54632","scoring_system":"epss","scoring_elements":"0.98035","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7286"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891228","reference_id":"891228","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891228"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/44181.py","reference_id":"CVE-2018-7286","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/44181.py"},{"reference_url":"https://raw.githubusercontent.com/EnableSecurity/advisories/master/ES2018-04-asterisk-pjsip-tcp-segfault/README.md","reference_id":"CVE-2018-7286","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/EnableSecurity/advisories/master/ES2018-04-asterisk-pjsip-tcp-segfault/README.md"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037079?format=json","purl":"pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%2Bdeb9u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%252Bdeb9u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2018-7286"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ggu9-8qd1-4ffx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34032?format=json","vulnerability_id":"VCID-p5vz-kq6m-63dd","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-17281","reference_id":"","reference_type":"","scores":[{"value":"0.80258","scoring_system":"epss","scoring_elements":"0.99108","published_at":"2026-04-01T12:55:00Z"},{"value":"0.80258","scoring_system":"epss","scoring_elements":"0.99109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.80258","scoring_system":"epss","scoring_elements":"0.99111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.80258","scoring_system":"epss","scoring_elements":"0.99115","published_at":"2026-04-07T12:55:00Z"},{"value":"0.80258","scoring_system":"epss","scoring_elements":"0.99116","published_at":"2026-04-09T12:55:00Z"},{"value":"0.80258","scoring_system":"epss","scoring_elements":"0.99117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.80258","scoring_system":"epss","scoring_elements":"0.99118","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-17281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7286"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909554","reference_id":"909554","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909554"},{"reference_url":"https://security.gentoo.org/glsa/201811-11","reference_id":"GLSA-201811-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037079?format=json","purl":"pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%2Bdeb9u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%252Bdeb9u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2018-17281"],"risk_score":1.4,"exploitability":"2.0","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5vz-kq6m-63dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94225?format=json","vulnerability_id":"VCID-qksp-5hqu-7qad","summary":"An Integer Signedness issue (for a return code) in the res_pjsip_sdp_rtp module in Digium Asterisk versions 15.7.1 and earlier and 16.1.1 and earlier allows remote authenticated users to crash Asterisk via a specially crafted SDP protocol violation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7251","reference_id":"","reference_type":"","scores":[{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.89019","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.89022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.88965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.88973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.88989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.88992","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.8901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.89015","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04411","scoring_system":"epss","scoring_elements":"0.89026","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7251"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7251","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7251"},{"reference_url":"https://downloads.asterisk.org/pub/security/AST-2019-001.html","reference_id":"","reference_type":"","scores":[],"url":"https://downloads.asterisk.org/pub/security/AST-2019-001.html"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-28260","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-28260"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923690","reference_id":"923690","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=923690"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7251","reference_id":"CVE-2019-7251","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7251"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2019-7251"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qksp-5hqu-7qad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58861?format=json","vulnerability_id":"VCID-r6s6-y3q8-vydc","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which allows remote execution of arbitrary shell commands.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14099","reference_id":"","reference_type":"","scores":[{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58598","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58702","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58669","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58721","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58707","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14100"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873907","reference_id":"873907","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873907"},{"reference_url":"https://security.gentoo.org/glsa/201710-29","reference_id":"GLSA-201710-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-29"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035945?format=json","purl":"pkg:deb/debian/asterisk@1:11.13.1~dfsg-2%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-2r38-yjx6-uuae"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6jv8-3wch-wfew"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-7tjs-ybpe-r7hg"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8shw-ev6h-dqgh"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-ay1n-kp3k-37db"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bbhx-pe8h-fubn"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-ebcm-kjvz-73cz"},{"vulnerability":"VCID-edp8-yh2h-xuck"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f1y5-37zk-x3ey"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-fz7z-xttk-13by"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-jwaj-b8n5-bbcx"},{"vulnerability":"VCID-k1zu-wpsb-wyh3"},{"vulnerability":"VCID-m27d-dqzg-w7gr"},{"vulnerability":"VCID-mcfv-fuk8-cqaq"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rb5h-mvxt-7qhv"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-sqgd-ykvk-2qay"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"},{"vulnerability":"VCID-zzpx-gwmv-sfbz"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:11.13.1~dfsg-2%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037079?format=json","purl":"pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%2Bdeb9u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%252Bdeb9u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-14099"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r6s6-y3q8-vydc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73684?format=json","vulnerability_id":"VCID-rwug-45gf-s3bz","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7284","reference_id":"","reference_type":"","scores":[{"value":"0.65243","scoring_system":"epss","scoring_elements":"0.98469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.65243","scoring_system":"epss","scoring_elements":"0.98471","published_at":"2026-04-02T12:55:00Z"},{"value":"0.65243","scoring_system":"epss","scoring_elements":"0.98474","published_at":"2026-04-04T12:55:00Z"},{"value":"0.65243","scoring_system":"epss","scoring_elements":"0.98475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.65243","scoring_system":"epss","scoring_elements":"0.98479","published_at":"2026-04-08T12:55:00Z"},{"value":"0.65243","scoring_system":"epss","scoring_elements":"0.9848","published_at":"2026-04-09T12:55:00Z"},{"value":"0.65243","scoring_system":"epss","scoring_elements":"0.98483","published_at":"2026-04-11T12:55:00Z"},{"value":"0.65243","scoring_system":"epss","scoring_elements":"0.98482","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7286"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891227","reference_id":"891227","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891227"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/44184.py","reference_id":"CVE-2018-7284","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/44184.py"},{"reference_url":"https://raw.githubusercontent.com/EnableSecurity/advisories/master/ES2018-01-asterisk-pjsip-subscribe-stack-corruption/README.md","reference_id":"CVE-2018-7284","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/EnableSecurity/advisories/master/ES2018-01-asterisk-pjsip-subscribe-stack-corruption/README.md"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037079?format=json","purl":"pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%2Bdeb9u4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-7ner-5xz7-93gz"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8qy8-gk53-eufc"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-a2n5-xpy5-gyfh"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-dpra-jbea-4fcy"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-eund-5mfa-9kbn"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-fndq-j9d2-afed"},{"vulnerability":"VCID-ggu9-8qd1-4ffx"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-p5vz-kq6m-63dd"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-qksp-5hqu-7qad"},{"vulnerability":"VCID-r6s6-y3q8-vydc"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-rwug-45gf-s3bz"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u4gv-ss9p-sqe9"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-w9e8-ekah-wfg2"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y3vu-z8tx-tubb"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zvwt-wp8r-1qhx"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:13.14.1~dfsg-2%252Bdeb9u4"},{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2018-7284"],"risk_score":1.2,"exploitability":"2.0","weighted_severity":"0.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rwug-45gf-s3bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58860?format=json","vulnerability_id":"VCID-u4gv-ss9p-sqe9","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which allows remote execution of arbitrary shell commands.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14098","reference_id":"","reference_type":"","scores":[{"value":"0.40123","scoring_system":"epss","scoring_elements":"0.97314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.40123","scoring_system":"epss","scoring_elements":"0.9732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.40123","scoring_system":"epss","scoring_elements":"0.97324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.40123","scoring_system":"epss","scoring_elements":"0.97325","published_at":"2026-04-07T12:55:00Z"},{"value":"0.40123","scoring_system":"epss","scoring_elements":"0.97332","published_at":"2026-04-09T12:55:00Z"},{"value":"0.40123","scoring_system":"epss","scoring_elements":"0.97334","published_at":"2026-04-11T12:55:00Z"},{"value":"0.40123","scoring_system":"epss","scoring_elements":"0.97335","published_at":"2026-04-12T12:55:00Z"},{"value":"0.40123","scoring_system":"epss","scoring_elements":"0.97336","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-14098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14098"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873909","reference_id":"873909","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873909"},{"reference_url":"https://security.gentoo.org/glsa/201710-29","reference_id":"GLSA-201710-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-29"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-14098"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4gv-ss9p-sqe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34029?format=json","vulnerability_id":"VCID-w9e8-ekah-wfg2","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"http://downloads.asterisk.org/pub/security/AST-2017-014.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.asterisk.org/pub/security/AST-2017-014.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17850","reference_id":"","reference_type":"","scores":[{"value":"0.29958","scoring_system":"epss","scoring_elements":"0.96649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29958","scoring_system":"epss","scoring_elements":"0.96634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29958","scoring_system":"epss","scoring_elements":"0.96641","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29958","scoring_system":"epss","scoring_elements":"0.96643","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29958","scoring_system":"epss","scoring_elements":"0.96646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.67457","scoring_system":"epss","scoring_elements":"0.98558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.67457","scoring_system":"epss","scoring_elements":"0.9856","published_at":"2026-04-02T12:55:00Z"},{"value":"0.67457","scoring_system":"epss","scoring_elements":"0.98563","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17850"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-27480","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-27480"},{"reference_url":"http://www.securitytracker.com/id/1040056","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040056"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=885072","reference_id":"885072","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=885072"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.1.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.8:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17850","reference_id":"CVE-2017-17850","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17850"},{"reference_url":"https://security.gentoo.org/glsa/201811-11","reference_id":"GLSA-201811-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-17850"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w9e8-ekah-wfg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94098?format=json","vulnerability_id":"VCID-y3vu-z8tx-tubb","summary":"An issue was discovered in res_pjsip_t38.c in Sangoma Asterisk through 13.x and Certified Asterisk through 13.21-x. If it receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a NULL pointer dereference and crash will occur. This is different from CVE-2019-18940.","references":[{"reference_url":"http://downloads.asterisk.org/pub/security/AST-2019-008.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.asterisk.org/pub/security/AST-2019-008.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18976","reference_id":"","reference_type":"","scores":[{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37646","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37547","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37683","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3771","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18976"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00001.html"},{"reference_url":"https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html","reference_id":"","reference_type":"","scores":[],"url":"https://packetstormsecurity.com/files/155436/Asterisk-Project-Security-Advisory-AST-2019-008.html"},{"reference_url":"https://seclists.org/fulldisclosure/2019/Nov/20","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/fulldisclosure/2019/Nov/20"},{"reference_url":"https://www.asterisk.org/downloads/security-advisories","reference_id":"","reference_type":"","scores":[],"url":"https://www.asterisk.org/downloads/security-advisories"},{"reference_url":"https://www.cybersecurity-help.cz/vdb/SB2019112218?affChecked=1","reference_id":"","reference_type":"","scores":[],"url":"https://www.cybersecurity-help.cz/vdb/SB2019112218?affChecked=1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.21:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.21:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18976","reference_id":"CVE-2019-18976","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18976"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2019-18976"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y3vu-z8tx-tubb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34028?format=json","vulnerability_id":"VCID-zvwt-wp8r-1qhx","summary":"Multiple vulnerabilities have been found in Asterisk, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"http://downloads.digium.com/pub/security/AST-2017-011.html","reference_id":"","reference_type":"","scores":[],"url":"http://downloads.digium.com/pub/security/AST-2017-011.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16672","reference_id":"","reference_type":"","scores":[{"value":"0.05269","scoring_system":"epss","scoring_elements":"0.90001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05269","scoring_system":"epss","scoring_elements":"0.90003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05269","scoring_system":"epss","scoring_elements":"0.89952","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05269","scoring_system":"epss","scoring_elements":"0.89955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05269","scoring_system":"epss","scoring_elements":"0.89967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05269","scoring_system":"epss","scoring_elements":"0.89974","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05269","scoring_system":"epss","scoring_elements":"0.8999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05269","scoring_system":"epss","scoring_elements":"0.89995","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16672"},{"reference_url":"https://issues.asterisk.org/jira/browse/ASTERISK-27345","reference_id":"","reference_type":"","scores":[],"url":"https://issues.asterisk.org/jira/browse/ASTERISK-27345"},{"reference_url":"https://www.debian.org/security/2017/dsa-4076","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4076"},{"reference_url":"http://www.securityfocus.com/bid/101765","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101765"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881256","reference_id":"881256","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881256"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert1_rc4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:digium:certified_asterisk:13.13.0:cert6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:certified_asterisk:13.13.0:cert6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16672","reference_id":"CVE-2017-16672","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16672"},{"reference_url":"https://security.gentoo.org/glsa/201811-11","reference_id":"GLSA-201811-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201811-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049299?format=json","purl":"pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%2Bdeb10u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1qxc-4xk5-2feu"},{"vulnerability":"VCID-2qjc-yspn-xydj"},{"vulnerability":"VCID-32hs-eqw2-1kf2"},{"vulnerability":"VCID-34fv-tv5a-tkgw"},{"vulnerability":"VCID-43ff-97jw-hkce"},{"vulnerability":"VCID-48pt-6j6q-jbcn"},{"vulnerability":"VCID-55vv-7jsj-xqeh"},{"vulnerability":"VCID-5yue-52xt-ryhw"},{"vulnerability":"VCID-63fe-saga-13ct"},{"vulnerability":"VCID-6rhm-xrwe-x7af"},{"vulnerability":"VCID-7kus-4n4f-myd1"},{"vulnerability":"VCID-7m8s-6ydk-gbgr"},{"vulnerability":"VCID-8kjy-xtm2-bqan"},{"vulnerability":"VCID-8pdp-epea-juhj"},{"vulnerability":"VCID-8sys-3sj7-c3h6"},{"vulnerability":"VCID-8yav-jpp1-rfbe"},{"vulnerability":"VCID-917e-7kp2-y3hw"},{"vulnerability":"VCID-9at6-bgzv-gue3"},{"vulnerability":"VCID-9f9j-z7y7-sffy"},{"vulnerability":"VCID-9u4p-wdky-a3h1"},{"vulnerability":"VCID-ap3n-99gn-aucs"},{"vulnerability":"VCID-b4z5-5hbq-5ka8"},{"vulnerability":"VCID-bk8r-brkr-bqc6"},{"vulnerability":"VCID-bknu-abgc-bugw"},{"vulnerability":"VCID-byqv-c5jp-6ybg"},{"vulnerability":"VCID-cupt-538a-z3fp"},{"vulnerability":"VCID-ddpb-zwva-rfc5"},{"vulnerability":"VCID-epzp-dpmr-33df"},{"vulnerability":"VCID-f5qc-tsbr-1yap"},{"vulnerability":"VCID-fjzf-5rtw-rqfj"},{"vulnerability":"VCID-gkcp-1zz6-tfb5"},{"vulnerability":"VCID-gy3u-c6dc-sbbn"},{"vulnerability":"VCID-h193-vjhb-j3a3"},{"vulnerability":"VCID-hj93-7z1r-vkfk"},{"vulnerability":"VCID-huqt-1fv6-67cz"},{"vulnerability":"VCID-n6mj-v1nc-hke9"},{"vulnerability":"VCID-nf5d-nejq-mkd9"},{"vulnerability":"VCID-ngds-k5mh-t3ae"},{"vulnerability":"VCID-phb4-xaj7-byg2"},{"vulnerability":"VCID-pmte-bc34-pfcv"},{"vulnerability":"VCID-psbg-wv2x-w7ba"},{"vulnerability":"VCID-qcqe-63ev-f7gv"},{"vulnerability":"VCID-r8b9-jcqa-xyb2"},{"vulnerability":"VCID-tqwd-ffwc-mkd1"},{"vulnerability":"VCID-tyh4-14zn-63ez"},{"vulnerability":"VCID-u91b-9huy-43hn"},{"vulnerability":"VCID-v7ev-jtsg-cqdg"},{"vulnerability":"VCID-vwf4-v4ve-4yfh"},{"vulnerability":"VCID-w9ce-m3x8-n3ak"},{"vulnerability":"VCID-x2gp-mft6-1yhy"},{"vulnerability":"VCID-xbe4-uvqu-6kf7"},{"vulnerability":"VCID-y6sx-xqsh-wbcg"},{"vulnerability":"VCID-ytty-tbs1-ffc7"},{"vulnerability":"VCID-yx1m-ayfg-ryc3"},{"vulnerability":"VCID-z3fq-m317-ckb8"},{"vulnerability":"VCID-zabf-adce-sqde"},{"vulnerability":"VCID-zxkf-88k3-3qcn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}],"aliases":["CVE-2017-16672"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zvwt-wp8r-1qhx"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.2.1~dfsg-1%252Bdeb10u2"}