{"url":"http://public2.vulnerablecode.io/api/packages/1052844?format=json","purl":"pkg:deb/debian/libaws@2.2dfsg-1","type":"deb","namespace":"debian","name":"libaws","version":"2.2dfsg-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90777?format=json","vulnerability_id":"VCID-1cad-s6nn-j7aw","summary":"embedded prototype.js JavaScript hijacking","references":[{"reference_url":"http://dev.rubyonrails.org/ticket/7910","reference_id":"","reference_type":"","scores":[],"url":"http://dev.rubyonrails.org/ticket/7910"},{"reference_url":"http://prototypejs.org/2007/4/24/release-candidate-3","reference_id":"","reference_type":"","scores":[],"url":"http://prototypejs.org/2007/4/24/release-candidate-3"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2383.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2383","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49515","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49489","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49548","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49537","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49583","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49509","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49425","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49486","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2383"},{"reference_url":"http://secunia.com/advisories/37677","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/37677"},{"reference_url":"http://www.debian.org/security/2009/dsa-1952","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1952"},{"reference_url":"http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=539592","reference_id":"539592","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=539592"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220","reference_id":"555220","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221","reference_id":"555221","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250","reference_id":"555250","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255","reference_id":"555255","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977","reference_id":"558977","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:prototypejs:prototype_framework:1.5.1_rc3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:prototypejs:prototype_framework:1.5.1_rc3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:prototypejs:prototype_framework:1.5.1_rc3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2383","reference_id":"CVE-2007-2383","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2383"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052846?format=json","purl":"pkg:deb/debian/libaws@2.7-4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cgnp-48ep-due6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libaws@2.7-4"}],"aliases":["CVE-2007-2383"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1cad-s6nn-j7aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96301?format=json","vulnerability_id":"VCID-cgnp-48ep-due6","summary":"When AdaCore Ada Web Server 25.0.0 is linked with GnuTLS, the default behaviour of AWS.Client is vulnerable to a man-in-the-middle attack because of lack of verification of an HTTPS server's certificate (unless the using program specifies a TLS configuration).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-55581","reference_id":"","reference_type":"","scores":[{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31252","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46343","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46256","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46336","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46284","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46277","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46325","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.4619","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5274","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52769","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00307","scoring_system":"epss","scoring_elements":"0.53933","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-55581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55581"},{"reference_url":"https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf","reference_id":"SEC.AWS-0056-v1.pdf","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-03-04T19:47:08Z/"}],"url":"https://docs.adacore.com/corp/security-advisories/SEC.AWS-0056-v1.pdf"}],"fixed_packages":[],"aliases":["CVE-2024-55581"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cgnp-48ep-due6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61622?format=json","vulnerability_id":"VCID-tekr-xkck-pkfu","summary":"Multiple vulnerabilities in Asterisk might allow remote attackers to cause\n    a Denial of Service condition, or conduct other attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-7220.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-7220.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-7220","reference_id":"","reference_type":"","scores":[{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.9306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93062","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93073","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93076","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93088","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93087","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93084","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93106","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10024","scoring_system":"epss","scoring_elements":"0.93117","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-7220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7220"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=523277","reference_id":"523277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=523277"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220","reference_id":"555220","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555220"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221","reference_id":"555221","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555221"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555242","reference_id":"555242","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555242"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555244","reference_id":"555244","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555244"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250","reference_id":"555250","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555250"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255","reference_id":"555255","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555255"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555259","reference_id":"555259","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555259"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555266","reference_id":"555266","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555266"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977","reference_id":"558977","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=558977"},{"reference_url":"https://security.gentoo.org/glsa/201006-20","reference_id":"GLSA-201006-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-20"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052846?format=json","purl":"pkg:deb/debian/libaws@2.7-4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cgnp-48ep-due6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libaws@2.7-4"}],"aliases":["CVE-2008-7220"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tekr-xkck-pkfu"}],"fixing_vulnerabilities":[],"risk_score":"2.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libaws@2.2dfsg-1"}