Lookup for vulnerable packages by Package URL.

GET /api/packages/415848?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/415848?format=api",
    "purl": "pkg:apk/alpine/dnsdist@2.0.1-r0?arch=x86_64&distroversion=v3.23&reponame=community",
    "type": "apk",
    "namespace": "alpine",
    "name": "dnsdist",
    "version": "2.0.1-r0",
    "qualifiers": {
        "arch": "x86_64",
        "distroversion": "v3.23",
        "reponame": "community"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.0.4-r0",
    "latest_non_vulnerable_version": "2.0.4-r0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97808?format=api",
            "vulnerability_id": "VCID-4d91-y27h-vyft",
            "summary": "In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01224",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01094",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01101",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01103",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01214",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01221",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0123",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01231",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01112",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01118",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01124",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01107",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01274",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01331",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01261",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30187"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115643",
                    "reference_id": "1115643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1115643"
                },
                {
                    "reference_url": "https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html",
                    "reference_id": "powerdns-advisory-for-dnsdist-2025-05.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-18T13:38:54Z/"
                        }
                    ],
                    "url": "https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8037-1/",
                    "reference_id": "USN-8037-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8037-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/415848?format=api",
                    "purl": "pkg:apk/alpine/dnsdist@2.0.1-r0?arch=x86_64&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2025-30187"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4d91-y27h-vyft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68408?format=api",
            "vulnerability_id": "VCID-cmeu-b3fh-hkaf",
            "summary": "upstream:",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67591",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67503",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67579",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67544",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67525",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67555",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67568",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69244",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69252",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00589",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69213",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73605",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73624",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73598",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8671"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388222",
                    "reference_id": "2388222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388222"
                },
                {
                    "reference_url": "https://www.fastlystatus.com/incident/377810",
                    "reference_id": "377810",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/"
                        }
                    ],
                    "url": "https://www.fastlystatus.com/incident/377810"
                },
                {
                    "reference_url": "https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80",
                    "reference_id": "4729b661e3c6654198d2cc62997e1af58bef4b80",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/"
                        }
                    ],
                    "url": "https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80"
                },
                {
                    "reference_url": "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325",
                    "reference_id": "5325",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/"
                        }
                    ],
                    "url": "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325"
                },
                {
                    "reference_url": "https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq",
                    "reference_id": "GHSA-mrjm-qq9m-9mjq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/"
                        }
                    ],
                    "url": "https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq"
                },
                {
                    "reference_url": "https://www.suse.com/support/kb/doc/?id=000021980",
                    "reference_id": "?id=000021980",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/"
                        }
                    ],
                    "url": "https://www.suse.com/support/kb/doc/?id=000021980"
                },
                {
                    "reference_url": "https://support2.windriver.com/index.php?page=security-notices",
                    "reference_id": "index.php?page=security-notices",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/"
                        }
                    ],
                    "url": "https://support2.windriver.com/index.php?page=security-notices"
                },
                {
                    "reference_url": "https://galbarnahum.com/made-you-reset",
                    "reference_id": "made-you-reset",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/"
                        }
                    ],
                    "url": "https://galbarnahum.com/made-you-reset"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8037-1/",
                    "reference_id": "USN-8037-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8037-1/"
                },
                {
                    "reference_url": "https://varnish-cache.org/security/VSV00017.html",
                    "reference_id": "VSV00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:34:19Z/"
                        }
                    ],
                    "url": "https://varnish-cache.org/security/VSV00017.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/415848?format=api",
                    "purl": "pkg:apk/alpine/dnsdist@2.0.1-r0?arch=x86_64&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2025-8671",
                "VSV00017"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmeu-b3fh-hkaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/266533?format=api",
            "vulnerability_id": "VCID-ey97-9yys-7bha",
            "summary": "Impact\n\nCloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.\n\nAn unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames covering a large range of packet numbers (including packet numbers that had never been sent); see RFC 9000 Section 19.3. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support. In extreme cases, the window might grow beyond the limit of the internal variable's type, leading to an overflow panic.\n\n\n\nPatches\n\n\nquiche 0.24.4 is the earliest version containing the fix for this issue.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55441",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55465",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55444",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55495",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55505",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55484",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00324",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55467",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74681",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7471",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74635",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74642",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74675",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74677",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74634",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00833",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74669",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4821"
                },
                {
                    "reference_url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-6m38-4r9r-5c4m",
                    "reference_id": "GHSA-6m38-4r9r-5c4m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T18:29:42Z/"
                        }
                    ],
                    "url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-6m38-4r9r-5c4m"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/415848?format=api",
                    "purl": "pkg:apk/alpine/dnsdist@2.0.1-r0?arch=x86_64&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2025-4821"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ey97-9yys-7bha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29036?format=api",
            "vulnerability_id": "VCID-s9za-jdcy-fkbc",
            "summary": "quiche connection ID retirement can trigger an infinite loop\n## Impact\n\nCloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames.\n\nQUIC connections possess a set of connection identifiers (IDs); see [Section 5.1 of RFC 9000](https://datatracker.ietf.org/doc/html/rfc9000#section-5.1). Once the QUIC handshake completes, a local endpoint is responsible for issuing and retiring Connection IDs that are used by the remote peer to populate the Destination Connection ID field in packets sent from remote to local. Each Connection ID has a sequence number to ensure synchronization between peers\n\nAn unauthenticated remote attacker can exploit this vulnerability by first completing a handshake and then sending a specially-crafted set of frames that trigger a connection ID retirement in the victim. When the victim attempts to send a packet containing RETIRE_CONNECTION_ID frames, [Section 19.16 of RFC 9000](https://datatracker.ietf.org/doc/html/rfc9000#section-19.16) requires that the sequence number of the retired connection ID must not be the same as the sequence number of the connection ID used by the packet. In other words, a packet cannot contain a frame that retires itself.  In scenarios such as path migration, it is possible for there to be multiple active paths with different active connection IDs that could be used to retire each other. The exploit triggered an unintentional behaviour of a quiche design feature that supports retirement across paths while maintaining full connection ID  synchronization, leading to an infinite loop.\n\n## Patches\n\nquiche 0.24.5 is the earliest version containing the fix for the issue",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09242",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09156",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0913",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0921",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09239",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10384",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10406",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10358",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10227",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13011",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12875",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12979",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23107",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23024",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7054"
                },
                {
                    "reference_url": "https://github.com/cloudflare/quiche",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/cloudflare/quiche"
                },
                {
                    "reference_url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-m3hh-f9gh-74c2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-07T15:52:05Z/"
                        }
                    ],
                    "url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-m3hh-f9gh-74c2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7054"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-m3hh-f9gh-74c2",
                    "reference_id": "GHSA-m3hh-f9gh-74c2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-m3hh-f9gh-74c2"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/415848?format=api",
                    "purl": "pkg:apk/alpine/dnsdist@2.0.1-r0?arch=x86_64&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2025-7054",
                "GHSA-m3hh-f9gh-74c2"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s9za-jdcy-fkbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/266458?format=api",
            "vulnerability_id": "VCID-tsj1-ebsc-zbhm",
            "summary": "Impact\n\nCloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.\n\nAn unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames exercising an opportunistic ACK attack; see RFC 9000 Section 21.4. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support.\n\n\n\nPatches\n\n\nquiche 0.24.4 is the earliest version containing the fix for this issue.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4820",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.563",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56322",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56302",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56354",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56359",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56369",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56345",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56327",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75109",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75143",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75064",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75105",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75116",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75072",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75062",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.751",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4820"
                },
                {
                    "reference_url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-2v9p-3p3h-w56j",
                    "reference_id": "GHSA-2v9p-3p3h-w56j",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T18:27:27Z/"
                        }
                    ],
                    "url": "https://github.com/cloudflare/quiche/security/advisories/GHSA-2v9p-3p3h-w56j"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/415848?format=api",
                    "purl": "pkg:apk/alpine/dnsdist@2.0.1-r0?arch=x86_64&distroversion=v3.23&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2025-4820"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsj1-ebsc-zbhm"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dnsdist@2.0.1-r0%3Farch=x86_64&distroversion=v3.23&reponame=community"
}