{"url":"http://public2.vulnerablecode.io/api/packages/931941?format=json","purl":"pkg:deb/debian/nghttp2@1.43.0-1%2Bdeb11u2?distro=trixie","type":"deb","namespace":"debian","name":"nghttp2","version":"1.43.0-1+deb11u2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.52.0-1+deb12u1","latest_non_vulnerable_version":"1.69.0-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44714?format=json","vulnerability_id":"VCID-94sx-qnsn-5ucm","summary":"Multiple vulnerabilities have been discovered in nghttp2, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28182.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28182","reference_id":"","reference_type":"","scores":[{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96157","published_at":"2026-04-08T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96178","published_at":"2026-04-18T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96165","published_at":"2026-04-13T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96164","published_at":"2026-04-12T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96147","published_at":"2026-04-07T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96161","published_at":"2026-04-09T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96183","published_at":"2026-04-29T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96182","published_at":"2026-04-24T12:55:00Z"},{"value":"0.24971","scoring_system":"epss","scoring_elements":"0.96179","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0","reference_id":"00201ecd8f982da3b67d4f6868af72a1b03b14e0","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-04T17:15:08Z/"}],"url":"https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068415","reference_id":"1068415","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068415"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268639","reference_id":"2268639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268639"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/","reference_id":"AGOME6ZXJG7664IPQNVE3DL67E3YP3HY","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-04T17:15:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/"},{"reference_url":"https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9","reference_id":"d71a4668c6bead55805d18810d633fbb98315af9","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-04T17:15:08Z/"}],"url":"https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9"},{"reference_url":"https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q","reference_id":"GHSA-x6x3-gv8h-m57q","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-04T17:15:08Z/"}],"url":"https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q"},{"reference_url":"https://security.gentoo.org/glsa/202408-10","reference_id":"GLSA-202408-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-10"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/","reference_id":"J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-04T17:15:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-04T17:15:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/","reference_id":"PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-04T17:15:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2693","reference_id":"RHSA-2024:2693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2694","reference_id":"RHSA-2024:2694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2778","reference_id":"RHSA-2024:2778","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2779","reference_id":"RHSA-2024:2779","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2780","reference_id":"RHSA-2024:2780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2853","reference_id":"RHSA-2024:2853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2910","reference_id":"RHSA-2024:2910","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2937","reference_id":"RHSA-2024:2937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3501","reference_id":"RHSA-2024:3501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3544","reference_id":"RHSA-2024:3544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3665","reference_id":"RHSA-2024:3665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3701","reference_id":"RHSA-2024:3701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3763","reference_id":"RHSA-2024:3763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3763"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3875","reference_id":"RHSA-2024:3875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4252","reference_id":"RHSA-2024:4252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4252"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4576","reference_id":"RHSA-2024:4576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4721","reference_id":"RHSA-2024:4721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4732","reference_id":"RHSA-2024:4732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4824","reference_id":"RHSA-2024:4824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4824"},{"reference_url":"https://usn.ubuntu.com/6754-1/","reference_id":"USN-6754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6754-1/"},{"reference_url":"https://usn.ubuntu.com/6754-2/","reference_id":"USN-6754-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6754-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931932?format=json","purl":"pkg:deb/debian/nghttp2@1.43.0-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gv39-q6pw-yfh4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nghttp2@1.43.0-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931941?format=json","purl":"pkg:deb/debian/nghttp2@1.43.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nghttp2@1.43.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931930?format=json","purl":"pkg:deb/debian/nghttp2@1.52.0-1%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gv39-q6pw-yfh4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nghttp2@1.52.0-1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931942?format=json","purl":"pkg:deb/debian/nghttp2@1.61.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nghttp2@1.61.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931934?format=json","purl":"pkg:deb/debian/nghttp2@1.64.0-1.1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gv39-q6pw-yfh4"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nghttp2@1.64.0-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/931933?format=json","purl":"pkg:deb/debian/nghttp2@1.68.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nghttp2@1.68.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076098?format=json","purl":"pkg:deb/debian/nghttp2@1.69.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nghttp2@1.69.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-28182"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-94sx-qnsn-5ucm"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nghttp2@1.43.0-1%252Bdeb11u2%3Fdistro=trixie"}