{"url":"http://public2.vulnerablecode.io/api/packages/582066?format=json","purl":"pkg:deb/debian/asterisk@1:1.4.18.1~dfsg-1?distro=sid","type":"deb","namespace":"debian","name":"asterisk","version":"1:1.4.18.1~dfsg-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1:1.4.19.1~dfsg-1","latest_non_vulnerable_version":"1:22.9.0+dfsg+~cs6.16.60671434-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90718?format=json","vulnerability_id":"VCID-a5sa-32q2-s3he","summary":"asterisk: Format String Vulnerability in Logger and Manager (AST-2008-004)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1333.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1333.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1333","reference_id":"","reference_type":"","scores":[{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86197","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86207","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.8622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86221","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.8624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86265","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86262","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86258","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1333"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438130","reference_id":"438130","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438130"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582066?format=json","purl":"pkg:deb/debian/asterisk@1:1.4.18.1~dfsg-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.18.1~dfsg-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582067?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-r54j-ydjm-4uca"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582068?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1062442?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"}],"aliases":["CVE-2008-1333"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a5sa-32q2-s3he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60122?format=json","vulnerability_id":"VCID-rb9n-t857-1uac","summary":"Multiple vulnerabilities have been found in Asterisk allowing for SQL\n    injection, session hijacking and unauthorized usage.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1332.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1332.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1332","reference_id":"","reference_type":"","scores":[{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77671","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1332"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438129","reference_id":"438129","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438129"},{"reference_url":"https://security.gentoo.org/glsa/200804-13","reference_id":"GLSA-200804-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200804-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582066?format=json","purl":"pkg:deb/debian/asterisk@1:1.4.18.1~dfsg-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.18.1~dfsg-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582067?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-r54j-ydjm-4uca"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582068?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1062442?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"}],"aliases":["CVE-2008-1332"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rb9n-t857-1uac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90717?format=json","vulnerability_id":"VCID-zr2v-gabj-8kak","summary":"asterisk: Two buffer overflows in RTP Codec Payload Handling (AST-2008-002)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1289.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1289.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1289","reference_id":"","reference_type":"","scores":[{"value":"0.24953","scoring_system":"epss","scoring_elements":"0.96126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.24953","scoring_system":"epss","scoring_elements":"0.96134","published_at":"2026-04-02T12:55:00Z"},{"value":"0.24953","scoring_system":"epss","scoring_elements":"0.96141","published_at":"2026-04-04T12:55:00Z"},{"value":"0.24953","scoring_system":"epss","scoring_elements":"0.96146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.24953","scoring_system":"epss","scoring_elements":"0.96156","published_at":"2026-04-08T12:55:00Z"},{"value":"0.24953","scoring_system":"epss","scoring_elements":"0.9616","published_at":"2026-04-09T12:55:00Z"},{"value":"0.24953","scoring_system":"epss","scoring_elements":"0.96162","published_at":"2026-04-12T12:55:00Z"},{"value":"0.24953","scoring_system":"epss","scoring_elements":"0.96164","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1289"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=438127","reference_id":"438127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=438127"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/31440.txt","reference_id":"CVE-2008-1289;OSVDB-43416","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/31440.txt"},{"reference_url":"https://www.securityfocus.com/bid/28308/info","reference_id":"CVE-2008-1289;OSVDB-43416","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/28308/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582066?format=json","purl":"pkg:deb/debian/asterisk@1:1.4.18.1~dfsg-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.18.1~dfsg-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582067?format=json","purl":"pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%2Bdeb11u4?distro=sid","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-r54j-ydjm-4uca"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:16.28.0~dfsg-0%252Bdeb11u4%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582068?format=json","purl":"pkg:deb/debian/asterisk@1:22.8.2%2Bdfsg%2B~cs6.15.60671435-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.8.2%252Bdfsg%252B~cs6.15.60671435-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1062442?format=json","purl":"pkg:deb/debian/asterisk@1:22.9.0%2Bdfsg%2B~cs6.16.60671434-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:22.9.0%252Bdfsg%252B~cs6.16.60671434-1%3Fdistro=sid"}],"aliases":["CVE-2008-1289"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zr2v-gabj-8kak"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/asterisk@1:1.4.18.1~dfsg-1%3Fdistro=sid"}