Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
Typedeb
Namespacedebian
Namering
Version20230206.0~ds2-1.1+deb12u1
Qualifiers
distro bullseye
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1gsq-daax-mfey
vulnerability_id VCID-1gsq-daax-mfey
summary
Multiple vulnerabilities have been found in PJSIP, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15260
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40124
published_at 2026-04-01T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40274
published_at 2026-04-08T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40299
published_at 2026-04-04T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40221
published_at 2026-04-07T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40285
published_at 2026-04-09T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-11T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40258
published_at 2026-04-12T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40239
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15260
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986815
reference_id 986815
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986815
3
reference_url https://security.gentoo.org/glsa/202107-42
reference_id GLSA-202107-42
reference_type
scores
url https://security.gentoo.org/glsa/202107-42
4
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2020-15260
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1gsq-daax-mfey
1
url VCID-34fv-tv5a-tkgw
vulnerability_id VCID-34fv-tv5a-tkgw
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23537
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.58944
published_at 2026-04-13T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.58904
published_at 2026-04-07T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.58956
published_at 2026-04-08T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.58962
published_at 2026-04-09T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.58981
published_at 2026-04-11T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.58963
published_at 2026-04-12T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.58915
published_at 2026-04-02T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.58938
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23537
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092
reference_id 1032092
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092
10
reference_url https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1
reference_id d8440f4d711a654b511f50f79c0445b26f9dd1e1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/
url https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1
11
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
reference_id GHSA-9pfh-r8x4-w26w
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
12
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
13
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-23537
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34fv-tv5a-tkgw
2
url VCID-48pt-6j6q-jbcn
vulnerability_id VCID-48pt-6j6q-jbcn
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23608
reference_id
reference_type
scores
0
value 0.00784
scoring_system epss
scoring_elements 0.73759
published_at 2026-04-13T12:55:00Z
1
value 0.00784
scoring_system epss
scoring_elements 0.73768
published_at 2026-04-12T12:55:00Z
2
value 0.00784
scoring_system epss
scoring_elements 0.73786
published_at 2026-04-11T12:55:00Z
3
value 0.00786
scoring_system epss
scoring_elements 0.73772
published_at 2026-04-02T12:55:00Z
4
value 0.00786
scoring_system epss
scoring_elements 0.73796
published_at 2026-04-04T12:55:00Z
5
value 0.00786
scoring_system epss
scoring_elements 0.73766
published_at 2026-04-07T12:55:00Z
6
value 0.00786
scoring_system epss
scoring_elements 0.73801
published_at 2026-04-08T12:55:00Z
7
value 0.00786
scoring_system epss
scoring_elements 0.73814
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23608
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url http://seclists.org/fulldisclosure/2022/Mar/1
reference_id 1
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url http://seclists.org/fulldisclosure/2022/Mar/1
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
23
reference_url http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
reference_id Asterisk-Project-Security-Advisory-AST-2022-005.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html
24
reference_url https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
reference_id db3235953baa56d2fb0e276ca510fefca751643f
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f
25
reference_url https://www.debian.org/security/2022/dsa-5285
reference_id dsa-5285
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url https://www.debian.org/security/2022/dsa-5285
26
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
reference_id GHSA-ffff-m5fm-qm62
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62
27
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url https://security.gentoo.org/glsa/202210-37
28
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
29
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
30
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
31
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html
reference_id msg00040.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html
32
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-23608
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-48pt-6j6q-jbcn
3
url VCID-7m8s-6ydk-gbgr
vulnerability_id VCID-7m8s-6ydk-gbgr
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37706
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48294
published_at 2026-04-13T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48285
published_at 2026-04-09T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48309
published_at 2026-04-11T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48283
published_at 2026-04-12T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48234
published_at 2026-04-07T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.4829
published_at 2026-04-08T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48607
published_at 2026-04-02T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48566
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37706
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
url https://security.gentoo.org/glsa/202210-37
23
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
24
reference_url https://usn.ubuntu.com/6422-2/
reference_id USN-6422-2
reference_type
scores
url https://usn.ubuntu.com/6422-2/
25
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-37706
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7m8s-6ydk-gbgr
4
url VCID-8sys-3sj7-c3h6
vulnerability_id VCID-8sys-3sj7-c3h6
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21722
reference_id
reference_type
scores
0
value 0.00462
scoring_system epss
scoring_elements 0.64147
published_at 2026-04-02T12:55:00Z
1
value 0.00462
scoring_system epss
scoring_elements 0.64175
published_at 2026-04-13T12:55:00Z
2
value 0.00462
scoring_system epss
scoring_elements 0.64135
published_at 2026-04-07T12:55:00Z
3
value 0.00462
scoring_system epss
scoring_elements 0.64185
published_at 2026-04-08T12:55:00Z
4
value 0.00462
scoring_system epss
scoring_elements 0.64201
published_at 2026-04-09T12:55:00Z
5
value 0.00462
scoring_system epss
scoring_elements 0.64215
published_at 2026-04-11T12:55:00Z
6
value 0.00462
scoring_system epss
scoring_elements 0.64204
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21722
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
reference_id 22af44e68a0c7d190ac1e25075e1382f77e9397a
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/
url https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a
23
reference_url https://www.debian.org/security/2022/dsa-5285
reference_id dsa-5285
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/
url https://www.debian.org/security/2022/dsa-5285
24
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
reference_id GHSA-m66q-q64c-hv36
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36
25
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/
url https://security.gentoo.org/glsa/202210-37
26
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
27
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
28
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
29
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-21722
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sys-3sj7-c3h6
5
url VCID-8yav-jpp1-rfbe
vulnerability_id VCID-8yav-jpp1-rfbe
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43299
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55471
published_at 2026-04-01T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55583
published_at 2026-04-02T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.5938
published_at 2026-04-04T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59346
published_at 2026-04-07T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.59397
published_at 2026-04-08T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59412
published_at 2026-04-09T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.5943
published_at 2026-04-11T12:55:00Z
7
value 0.00379
scoring_system epss
scoring_elements 0.59414
published_at 2026-04-12T12:55:00Z
8
value 0.00379
scoring_system epss
scoring_elements 0.59396
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43299
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
23
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-43299
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8yav-jpp1-rfbe
6
url VCID-9at6-bgzv-gue3
vulnerability_id VCID-9at6-bgzv-gue3
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39269
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.44513
published_at 2026-04-02T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44535
published_at 2026-04-04T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.44472
published_at 2026-04-07T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.44523
published_at 2026-04-08T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.44529
published_at 2026-04-09T12:55:00Z
5
value 0.00219
scoring_system epss
scoring_elements 0.44545
published_at 2026-04-11T12:55:00Z
6
value 0.00219
scoring_system epss
scoring_elements 0.44515
published_at 2026-04-12T12:55:00Z
7
value 0.00219
scoring_system epss
scoring_elements 0.44516
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39269
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092
reference_id 1032092
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092
10
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
url https://security.gentoo.org/glsa/202210-37
fixed_packages
0
url pkg:deb/debian/ring@0?distro=bullseye
purl pkg:deb/debian/ring@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@0%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-39269
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9at6-bgzv-gue3
7
url VCID-9f9j-z7y7-sffy
vulnerability_id VCID-9f9j-z7y7-sffy
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43845
reference_id
reference_type
scores
0
value 0.00285
scoring_system epss
scoring_elements 0.51925
published_at 2026-04-01T12:55:00Z
1
value 0.00285
scoring_system epss
scoring_elements 0.51973
published_at 2026-04-02T12:55:00Z
2
value 0.00285
scoring_system epss
scoring_elements 0.51999
published_at 2026-04-04T12:55:00Z
3
value 0.00285
scoring_system epss
scoring_elements 0.51965
published_at 2026-04-07T12:55:00Z
4
value 0.00285
scoring_system epss
scoring_elements 0.52019
published_at 2026-04-08T12:55:00Z
5
value 0.00285
scoring_system epss
scoring_elements 0.52018
published_at 2026-04-09T12:55:00Z
6
value 0.00285
scoring_system epss
scoring_elements 0.5207
published_at 2026-04-11T12:55:00Z
7
value 0.00285
scoring_system epss
scoring_elements 0.52052
published_at 2026-04-12T12:55:00Z
8
value 0.00285
scoring_system epss
scoring_elements 0.52036
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43845
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
url https://security.gentoo.org/glsa/202210-37
23
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-43845
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9f9j-z7y7-sffy
8
url VCID-ap3n-99gn-aucs
vulnerability_id VCID-ap3n-99gn-aucs
summary A vulnerability has been discovered in PJSIP, which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27585
reference_id
reference_type
scores
0
value 0.00495
scoring_system epss
scoring_elements 0.6572
published_at 2026-04-02T12:55:00Z
1
value 0.00495
scoring_system epss
scoring_elements 0.6575
published_at 2026-04-04T12:55:00Z
2
value 0.00495
scoring_system epss
scoring_elements 0.65716
published_at 2026-04-07T12:55:00Z
3
value 0.00495
scoring_system epss
scoring_elements 0.6577
published_at 2026-04-08T12:55:00Z
4
value 0.00495
scoring_system epss
scoring_elements 0.6578
published_at 2026-04-09T12:55:00Z
5
value 0.00495
scoring_system epss
scoring_elements 0.65801
published_at 2026-04-11T12:55:00Z
6
value 0.00495
scoring_system epss
scoring_elements 0.65787
published_at 2026-04-12T12:55:00Z
7
value 0.00495
scoring_system epss
scoring_elements 0.65757
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27585
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27585
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036697
reference_id 1036697
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036697
3
reference_url https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
reference_id d1c5e4da5bae7f220bc30719888bb389c905c0c5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/
url https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5
4
reference_url https://www.debian.org/security/2023/dsa-5438
reference_id dsa-5438
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/
url https://www.debian.org/security/2023/dsa-5438
5
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
reference_id GHSA-p6g5-v97c-w5q4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
6
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
reference_id GHSA-q9cp-8wcq-7pfr
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr
7
reference_url https://security.gentoo.org/glsa/202409-05
reference_id GLSA-202409-05
reference_type
scores
url https://security.gentoo.org/glsa/202409-05
8
reference_url https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
reference_id group__PJ__DNS__RESOLVER.htm
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/
url https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm
9
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html
reference_id msg00020.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html
10
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
11
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
12
reference_url https://usn.ubuntu.com/6422-2/
reference_id USN-6422-2
reference_type
scores
url https://usn.ubuntu.com/6422-2/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2023-27585
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ap3n-99gn-aucs
9
url VCID-byqv-c5jp-6ybg
vulnerability_id VCID-byqv-c5jp-6ybg
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43301
reference_id
reference_type
scores
0
value 0.00482
scoring_system epss
scoring_elements 0.65068
published_at 2026-04-01T12:55:00Z
1
value 0.00482
scoring_system epss
scoring_elements 0.65118
published_at 2026-04-02T12:55:00Z
2
value 0.00559
scoring_system epss
scoring_elements 0.68217
published_at 2026-04-04T12:55:00Z
3
value 0.00559
scoring_system epss
scoring_elements 0.68193
published_at 2026-04-07T12:55:00Z
4
value 0.00559
scoring_system epss
scoring_elements 0.68244
published_at 2026-04-08T12:55:00Z
5
value 0.00559
scoring_system epss
scoring_elements 0.68259
published_at 2026-04-09T12:55:00Z
6
value 0.00559
scoring_system epss
scoring_elements 0.68284
published_at 2026-04-11T12:55:00Z
7
value 0.00559
scoring_system epss
scoring_elements 0.68272
published_at 2026-04-12T12:55:00Z
8
value 0.00559
scoring_system epss
scoring_elements 0.68238
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43301
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
23
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-43301
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byqv-c5jp-6ybg
10
url VCID-ddpb-zwva-rfc5
vulnerability_id VCID-ddpb-zwva-rfc5
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21723
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64457
published_at 2026-04-02T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64488
published_at 2026-04-04T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64446
published_at 2026-04-07T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64495
published_at 2026-04-08T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64511
published_at 2026-04-09T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64526
published_at 2026-04-11T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64515
published_at 2026-04-12T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64487
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21723
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
reference_id 077b465c33f0aec05a49cd2ca456f9a1b112e896
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
23
reference_url http://seclists.org/fulldisclosure/2022/Mar/2
reference_id 2
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url http://seclists.org/fulldisclosure/2022/Mar/2
24
reference_url http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
reference_id Asterisk-Project-Security-Advisory-AST-2022-006.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html
25
reference_url https://www.debian.org/security/2022/dsa-5285
reference_id dsa-5285
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url https://www.debian.org/security/2022/dsa-5285
26
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
reference_id GHSA-7fw8-54cv-r7pm
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm
27
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url https://security.gentoo.org/glsa/202210-37
28
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
29
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
30
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
31
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-21723
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ddpb-zwva-rfc5
11
url VCID-dvf7-hwzb-4kg9
vulnerability_id VCID-dvf7-hwzb-4kg9
summary
Multiple vulnerabilities have been found in PJSIP, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21375
reference_id
reference_type
scores
0
value 0.01311
scoring_system epss
scoring_elements 0.79755
published_at 2026-04-01T12:55:00Z
1
value 0.01311
scoring_system epss
scoring_elements 0.79762
published_at 2026-04-02T12:55:00Z
2
value 0.01311
scoring_system epss
scoring_elements 0.79784
published_at 2026-04-04T12:55:00Z
3
value 0.01311
scoring_system epss
scoring_elements 0.7977
published_at 2026-04-07T12:55:00Z
4
value 0.01311
scoring_system epss
scoring_elements 0.79799
published_at 2026-04-08T12:55:00Z
5
value 0.01311
scoring_system epss
scoring_elements 0.79806
published_at 2026-04-09T12:55:00Z
6
value 0.01311
scoring_system epss
scoring_elements 0.79828
published_at 2026-04-11T12:55:00Z
7
value 0.01311
scoring_system epss
scoring_elements 0.79812
published_at 2026-04-12T12:55:00Z
8
value 0.01311
scoring_system epss
scoring_elements 0.79805
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21375
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986815
reference_id 986815
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986815
3
reference_url https://security.gentoo.org/glsa/202107-42
reference_id GLSA-202107-42
reference_type
scores
url https://security.gentoo.org/glsa/202107-42
4
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-21375
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvf7-hwzb-4kg9
12
url VCID-epzp-dpmr-33df
vulnerability_id VCID-epzp-dpmr-33df
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32686
reference_id
reference_type
scores
0
value 0.02081
scoring_system epss
scoring_elements 0.83919
published_at 2026-04-01T12:55:00Z
1
value 0.02081
scoring_system epss
scoring_elements 0.83934
published_at 2026-04-02T12:55:00Z
2
value 0.02769
scoring_system epss
scoring_elements 0.85996
published_at 2026-04-04T12:55:00Z
3
value 0.02769
scoring_system epss
scoring_elements 0.85995
published_at 2026-04-07T12:55:00Z
4
value 0.02769
scoring_system epss
scoring_elements 0.86015
published_at 2026-04-08T12:55:00Z
5
value 0.02769
scoring_system epss
scoring_elements 0.86025
published_at 2026-04-09T12:55:00Z
6
value 0.02769
scoring_system epss
scoring_elements 0.86039
published_at 2026-04-11T12:55:00Z
7
value 0.02769
scoring_system epss
scoring_elements 0.86037
published_at 2026-04-12T12:55:00Z
8
value 0.02769
scoring_system epss
scoring_elements 0.86032
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32686
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991931
reference_id 991931
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991931
5
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
url https://security.gentoo.org/glsa/202210-37
6
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-32686
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epzp-dpmr-33df
13
url VCID-f5qc-tsbr-1yap
vulnerability_id VCID-f5qc-tsbr-1yap
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43804
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53266
published_at 2026-04-01T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.5329
published_at 2026-04-02T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53315
published_at 2026-04-04T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53285
published_at 2026-04-07T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53337
published_at 2026-04-08T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53332
published_at 2026-04-09T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.53383
published_at 2026-04-11T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53366
published_at 2026-04-12T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.5335
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43804
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
url https://security.gentoo.org/glsa/202210-37
23
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-43804
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f5qc-tsbr-1yap
14
url VCID-hj93-7z1r-vkfk
vulnerability_id VCID-hj93-7z1r-vkfk
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24763
reference_id
reference_type
scores
0
value 0.01403
scoring_system epss
scoring_elements 0.80395
published_at 2026-04-02T12:55:00Z
1
value 0.01403
scoring_system epss
scoring_elements 0.80416
published_at 2026-04-04T12:55:00Z
2
value 0.01403
scoring_system epss
scoring_elements 0.80405
published_at 2026-04-07T12:55:00Z
3
value 0.01403
scoring_system epss
scoring_elements 0.80434
published_at 2026-04-08T12:55:00Z
4
value 0.01403
scoring_system epss
scoring_elements 0.80444
published_at 2026-04-09T12:55:00Z
5
value 0.01403
scoring_system epss
scoring_elements 0.80463
published_at 2026-04-11T12:55:00Z
6
value 0.01403
scoring_system epss
scoring_elements 0.80448
published_at 2026-04-12T12:55:00Z
7
value 0.01403
scoring_system epss
scoring_elements 0.80441
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24763
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
reference_id 1014976
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
23
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
url https://security.gentoo.org/glsa/202210-37
24
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-24763
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj93-7z1r-vkfk
15
url VCID-n6mj-v1nc-hke9
vulnerability_id VCID-n6mj-v1nc-hke9
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24793
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68474
published_at 2026-04-02T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68493
published_at 2026-04-04T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68469
published_at 2026-04-07T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68519
published_at 2026-04-08T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68536
published_at 2026-04-09T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.68563
published_at 2026-04-11T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.6855
published_at 2026-04-12T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68518
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24793
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
reference_id 1014976
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
23
reference_url https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
reference_id 9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/
url https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
24
reference_url https://www.debian.org/security/2022/dsa-5285
reference_id dsa-5285
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/
url https://www.debian.org/security/2022/dsa-5285
25
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
reference_id GHSA-p6g5-v97c-w5q4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
26
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/
url https://security.gentoo.org/glsa/202210-37
27
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
28
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
29
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html
reference_id msg00047.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html
30
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-24793
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n6mj-v1nc-hke9
16
url VCID-nf5d-nejq-mkd9
vulnerability_id VCID-nf5d-nejq-mkd9
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43303
reference_id
reference_type
scores
0
value 0.00454
scoring_system epss
scoring_elements 0.63734
published_at 2026-04-01T12:55:00Z
1
value 0.00454
scoring_system epss
scoring_elements 0.63795
published_at 2026-04-02T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67112
published_at 2026-04-04T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67086
published_at 2026-04-07T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.67136
published_at 2026-04-08T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67148
published_at 2026-04-09T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67167
published_at 2026-04-11T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67153
published_at 2026-04-12T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67122
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43303
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
23
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-43303
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nf5d-nejq-mkd9
17
url VCID-ngds-k5mh-t3ae
vulnerability_id VCID-ngds-k5mh-t3ae
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31031
reference_id
reference_type
scores
0
value 0.00721
scoring_system epss
scoring_elements 0.72444
published_at 2026-04-02T12:55:00Z
1
value 0.00721
scoring_system epss
scoring_elements 0.72462
published_at 2026-04-04T12:55:00Z
2
value 0.00721
scoring_system epss
scoring_elements 0.72438
published_at 2026-04-07T12:55:00Z
3
value 0.00721
scoring_system epss
scoring_elements 0.72476
published_at 2026-04-08T12:55:00Z
4
value 0.00721
scoring_system epss
scoring_elements 0.72489
published_at 2026-04-09T12:55:00Z
5
value 0.00721
scoring_system epss
scoring_elements 0.72511
published_at 2026-04-11T12:55:00Z
6
value 0.00721
scoring_system epss
scoring_elements 0.72494
published_at 2026-04-12T12:55:00Z
7
value 0.00721
scoring_system epss
scoring_elements 0.72484
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31031
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017004
reference_id 1017004
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017004
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017005
reference_id 1017005
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017005
11
reference_url https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202
reference_id 450baca94f475345542c6953832650c390889202
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/
url https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202
12
reference_url https://www.debian.org/security/2023/dsa-5358
reference_id dsa-5358
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/
url https://www.debian.org/security/2023/dsa-5358
13
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
reference_id GHSA-26j7-ww69-c4qj
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj
14
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/
url https://security.gentoo.org/glsa/202210-37
15
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html
16
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
17
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-31031
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngds-k5mh-t3ae
18
url VCID-psbg-wv2x-w7ba
vulnerability_id VCID-psbg-wv2x-w7ba
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23547
reference_id
reference_type
scores
0
value 0.00394
scoring_system epss
scoring_elements 0.60283
published_at 2026-04-02T12:55:00Z
1
value 0.00394
scoring_system epss
scoring_elements 0.60308
published_at 2026-04-04T12:55:00Z
2
value 0.00394
scoring_system epss
scoring_elements 0.60277
published_at 2026-04-07T12:55:00Z
3
value 0.00394
scoring_system epss
scoring_elements 0.60327
published_at 2026-04-08T12:55:00Z
4
value 0.00394
scoring_system epss
scoring_elements 0.60342
published_at 2026-04-09T12:55:00Z
5
value 0.00394
scoring_system epss
scoring_elements 0.60363
published_at 2026-04-11T12:55:00Z
6
value 0.00394
scoring_system epss
scoring_elements 0.60349
published_at 2026-04-12T12:55:00Z
7
value 0.00394
scoring_system epss
scoring_elements 0.6033
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23547
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092
reference_id 1032092
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092
10
reference_url https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36
reference_id bc4812d31a67d5e2f973fbfaf950d6118226cf36
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/
url https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36
11
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
reference_id GHSA-9pfh-r8x4-w26w
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w
12
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-cxwq-5g9x-x7fr
reference_id GHSA-cxwq-5g9x-x7fr
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-cxwq-5g9x-x7fr
13
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
14
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-23547
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-psbg-wv2x-w7ba
19
url VCID-tqwd-ffwc-mkd1
vulnerability_id VCID-tqwd-ffwc-mkd1
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24792
reference_id
reference_type
scores
0
value 0.01621
scoring_system epss
scoring_elements 0.81774
published_at 2026-04-02T12:55:00Z
1
value 0.01621
scoring_system epss
scoring_elements 0.81797
published_at 2026-04-04T12:55:00Z
2
value 0.01621
scoring_system epss
scoring_elements 0.81795
published_at 2026-04-07T12:55:00Z
3
value 0.01621
scoring_system epss
scoring_elements 0.81821
published_at 2026-04-08T12:55:00Z
4
value 0.01621
scoring_system epss
scoring_elements 0.81828
published_at 2026-04-09T12:55:00Z
5
value 0.01621
scoring_system epss
scoring_elements 0.81847
published_at 2026-04-11T12:55:00Z
6
value 0.01621
scoring_system epss
scoring_elements 0.81835
published_at 2026-04-12T12:55:00Z
7
value 0.01621
scoring_system epss
scoring_elements 0.81829
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24792
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
reference_id 1014976
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
22
reference_url https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213
reference_id 947bc1ee6d05be10204b918df75a503415fd3213
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/
url https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213
23
reference_url https://www.debian.org/security/2022/dsa-5285
reference_id dsa-5285
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/
url https://www.debian.org/security/2022/dsa-5285
24
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799
reference_id GHSA-rwgw-vwxg-q799
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799
25
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/
url https://security.gentoo.org/glsa/202210-37
26
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
27
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html
reference_id msg00047.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html
fixed_packages
0
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-24792
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqwd-ffwc-mkd1
20
url VCID-tw8d-u845-r3dq
vulnerability_id VCID-tw8d-u845-r3dq
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24754
reference_id
reference_type
scores
0
value 0.00466
scoring_system epss
scoring_elements 0.64356
published_at 2026-04-02T12:55:00Z
1
value 0.00466
scoring_system epss
scoring_elements 0.64385
published_at 2026-04-04T12:55:00Z
2
value 0.00466
scoring_system epss
scoring_elements 0.64344
published_at 2026-04-07T12:55:00Z
3
value 0.00466
scoring_system epss
scoring_elements 0.64393
published_at 2026-04-08T12:55:00Z
4
value 0.00466
scoring_system epss
scoring_elements 0.64408
published_at 2026-04-12T12:55:00Z
5
value 0.00466
scoring_system epss
scoring_elements 0.6442
published_at 2026-04-11T12:55:00Z
6
value 0.00466
scoring_system epss
scoring_elements 0.64379
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24754
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24754
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
3
reference_url https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
reference_id d27f79da11df7bc8bb56c2f291d71e54df8d2c47
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/
url https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47
4
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
reference_id GHSA-73f7-48m9-w662
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662
5
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/
url https://security.gentoo.org/glsa/202210-37
6
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 8.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
8
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-24754
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tw8d-u845-r3dq
21
url VCID-vwf4-v4ve-4yfh
vulnerability_id VCID-vwf4-v4ve-4yfh
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39244
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.55475
published_at 2026-04-02T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.555
published_at 2026-04-04T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55478
published_at 2026-04-07T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.5553
published_at 2026-04-09T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55539
published_at 2026-04-11T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55519
published_at 2026-04-12T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55502
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39244
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706
9
reference_url https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae
reference_id c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/
url https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae
10
reference_url https://www.debian.org/security/2023/dsa-5358
reference_id dsa-5358
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/
url https://www.debian.org/security/2023/dsa-5358
11
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj
reference_id GHSA-fq45-m3f7-3mhj
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj
12
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/
url https://security.gentoo.org/glsa/202210-37
13
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html
14
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
15
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-39244
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwf4-v4ve-4yfh
22
url VCID-w9ce-m3x8-n3ak
vulnerability_id VCID-w9ce-m3x8-n3ak
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24786
reference_id
reference_type
scores
0
value 0.00743
scoring_system epss
scoring_elements 0.72929
published_at 2026-04-02T12:55:00Z
1
value 0.00743
scoring_system epss
scoring_elements 0.72948
published_at 2026-04-04T12:55:00Z
2
value 0.00743
scoring_system epss
scoring_elements 0.72925
published_at 2026-04-07T12:55:00Z
3
value 0.00743
scoring_system epss
scoring_elements 0.72962
published_at 2026-04-08T12:55:00Z
4
value 0.00743
scoring_system epss
scoring_elements 0.72975
published_at 2026-04-09T12:55:00Z
5
value 0.00743
scoring_system epss
scoring_elements 0.73
published_at 2026-04-11T12:55:00Z
6
value 0.00743
scoring_system epss
scoring_elements 0.7298
published_at 2026-04-12T12:55:00Z
7
value 0.00743
scoring_system epss
scoring_elements 0.72973
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24786
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
reference_id 1014976
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
22
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
url https://security.gentoo.org/glsa/202210-37
fixed_packages
0
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-24786
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9ce-m3x8-n3ak
23
url VCID-y6sx-xqsh-wbcg
vulnerability_id VCID-y6sx-xqsh-wbcg
summary Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24764
reference_id
reference_type
scores
0
value 0.00942
scoring_system epss
scoring_elements 0.76197
published_at 2026-04-02T12:55:00Z
1
value 0.00942
scoring_system epss
scoring_elements 0.76229
published_at 2026-04-04T12:55:00Z
2
value 0.00942
scoring_system epss
scoring_elements 0.76209
published_at 2026-04-07T12:55:00Z
3
value 0.00942
scoring_system epss
scoring_elements 0.76241
published_at 2026-04-08T12:55:00Z
4
value 0.00942
scoring_system epss
scoring_elements 0.76254
published_at 2026-04-13T12:55:00Z
5
value 0.00942
scoring_system epss
scoring_elements 0.76281
published_at 2026-04-11T12:55:00Z
6
value 0.00942
scoring_system epss
scoring_elements 0.76258
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24764
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
reference_id 1014976
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
23
reference_url https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
reference_id 560a1346f87aabe126509bb24930106dea292b00
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/
url https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00
24
reference_url https://www.debian.org/security/2022/dsa-5285
reference_id dsa-5285
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/
url https://www.debian.org/security/2022/dsa-5285
25
reference_url https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
reference_id GHSA-f5qg-pqcg-765m
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/
url https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m
26
reference_url https://security.gentoo.org/glsa/202210-37
reference_id GLSA-202210-37
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/
url https://security.gentoo.org/glsa/202210-37
27
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
28
reference_url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/
url https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
29
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
reference_id msg00038.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
30
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2022-24764
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y6sx-xqsh-wbcg
24
url VCID-yx1m-ayfg-ryc3
vulnerability_id VCID-yx1m-ayfg-ryc3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43300
reference_id
reference_type
scores
0
value 0.00482
scoring_system epss
scoring_elements 0.65068
published_at 2026-04-01T12:55:00Z
1
value 0.00482
scoring_system epss
scoring_elements 0.65118
published_at 2026-04-02T12:55:00Z
2
value 0.00559
scoring_system epss
scoring_elements 0.68217
published_at 2026-04-04T12:55:00Z
3
value 0.00559
scoring_system epss
scoring_elements 0.68193
published_at 2026-04-07T12:55:00Z
4
value 0.00559
scoring_system epss
scoring_elements 0.68244
published_at 2026-04-08T12:55:00Z
5
value 0.00559
scoring_system epss
scoring_elements 0.68259
published_at 2026-04-09T12:55:00Z
6
value 0.00559
scoring_system epss
scoring_elements 0.68284
published_at 2026-04-11T12:55:00Z
7
value 0.00559
scoring_system epss
scoring_elements 0.68272
published_at 2026-04-12T12:55:00Z
8
value 0.00559
scoring_system epss
scoring_elements 0.68238
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43300
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
23
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-43300
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yx1m-ayfg-ryc3
25
url VCID-zxkf-88k3-3qcn
vulnerability_id VCID-zxkf-88k3-3qcn
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43302
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.5817
published_at 2026-04-01T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58255
published_at 2026-04-02T12:55:00Z
2
value 0.0042
scoring_system epss
scoring_elements 0.61902
published_at 2026-04-04T12:55:00Z
3
value 0.0042
scoring_system epss
scoring_elements 0.61873
published_at 2026-04-07T12:55:00Z
4
value 0.0042
scoring_system epss
scoring_elements 0.61922
published_at 2026-04-08T12:55:00Z
5
value 0.0042
scoring_system epss
scoring_elements 0.61939
published_at 2026-04-09T12:55:00Z
6
value 0.0042
scoring_system epss
scoring_elements 0.6196
published_at 2026-04-11T12:55:00Z
7
value 0.0042
scoring_system epss
scoring_elements 0.61949
published_at 2026-04-12T12:55:00Z
8
value 0.0042
scoring_system epss
scoring_elements 0.61928
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43302
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
reference_id 1014998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998
22
reference_url https://usn.ubuntu.com/6422-1/
reference_id USN-6422-1
reference_type
scores
url https://usn.ubuntu.com/6422-1/
23
reference_url https://usn.ubuntu.com/8122-1/
reference_id USN-8122-1
reference_type
scores
url https://usn.ubuntu.com/8122-1/
fixed_packages
0
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tqwd-ffwc-mkd1
1
vulnerability VCID-w9ce-m3x8-n3ak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye
1
url pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
purl pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye
2
url pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye
3
url pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
purl pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye
aliases CVE-2021-43302
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxkf-88k3-3qcn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye