Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/asterisk@16.5.1-r0?arch=aarch64&distroversion=v3.21&reponame=main
Typeapk
Namespacealpine
Nameasterisk
Version16.5.1-r0
Qualifiers
arch aarch64
distroversion v3.21
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version16.6.2-r0
Latest_non_vulnerable_version20.11.1-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2xc3-aqh8-cubn
vulnerability_id VCID-2xc3-aqh8-cubn
summary main/translate.c in Sangoma Asterisk 13.28.0 and 16.5.0 allows a remote attacker to send a specific RTP packet during a call and cause a crash in a specific scenario.
references
0
reference_url http://downloads.asterisk.org/pub/security/AST-2019-005.html
reference_id
reference_type
scores
url http://downloads.asterisk.org/pub/security/AST-2019-005.html
1
reference_url http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154372/Asterisk-Project-Security-Advisory-AST-2019-005.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15639
reference_id
reference_type
scores
0
value 0.088
scoring_system epss
scoring_elements 0.92526
published_at 2026-04-12T12:55:00Z
1
value 0.088
scoring_system epss
scoring_elements 0.92524
published_at 2026-04-13T12:55:00Z
2
value 0.088
scoring_system epss
scoring_elements 0.92484
published_at 2026-04-01T12:55:00Z
3
value 0.088
scoring_system epss
scoring_elements 0.9249
published_at 2026-04-02T12:55:00Z
4
value 0.088
scoring_system epss
scoring_elements 0.92499
published_at 2026-04-04T12:55:00Z
5
value 0.088
scoring_system epss
scoring_elements 0.92502
published_at 2026-04-07T12:55:00Z
6
value 0.088
scoring_system epss
scoring_elements 0.92513
published_at 2026-04-08T12:55:00Z
7
value 0.088
scoring_system epss
scoring_elements 0.92518
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15639
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15639
reference_id CVE-2019-15639
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15639
fixed_packages
0
url pkg:apk/alpine/asterisk@16.5.1-r0?arch=aarch64&distroversion=v3.21&reponame=main
purl pkg:apk/alpine/asterisk@16.5.1-r0?arch=aarch64&distroversion=v3.21&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/asterisk@16.5.1-r0%3Farch=aarch64&distroversion=v3.21&reponame=main
aliases CVE-2019-15639
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xc3-aqh8-cubn
1
url VCID-917e-7kp2-y3hw
vulnerability_id VCID-917e-7kp2-y3hw
summary res_pjsip_t38 in Sangoma Asterisk 15.x before 15.7.4 and 16.x before 16.5.1 allows an attacker to trigger a crash by sending a declined stream in a response to a T.38 re-invite initiated by Asterisk. The crash occurs because of a NULL session media object dereference.
references
0
reference_url http://downloads.asterisk.org/pub/security/AST-2019-004.html
reference_id
reference_type
scores
url http://downloads.asterisk.org/pub/security/AST-2019-004.html
1
reference_url http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154371/Asterisk-Project-Security-Advisory-AST-2019-004.html
2
reference_url http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/161671/Asterisk-Project-Security-Advisory-AST-2021-006.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-15297
reference_id
reference_type
scores
0
value 0.01814
scoring_system epss
scoring_elements 0.82843
published_at 2026-04-13T12:55:00Z
1
value 0.01814
scoring_system epss
scoring_elements 0.82847
published_at 2026-04-12T12:55:00Z
2
value 0.01814
scoring_system epss
scoring_elements 0.82779
published_at 2026-04-01T12:55:00Z
3
value 0.01814
scoring_system epss
scoring_elements 0.82795
published_at 2026-04-02T12:55:00Z
4
value 0.01814
scoring_system epss
scoring_elements 0.82809
published_at 2026-04-04T12:55:00Z
5
value 0.01814
scoring_system epss
scoring_elements 0.82804
published_at 2026-04-07T12:55:00Z
6
value 0.01814
scoring_system epss
scoring_elements 0.8283
published_at 2026-04-08T12:55:00Z
7
value 0.01814
scoring_system epss
scoring_elements 0.82836
published_at 2026-04-09T12:55:00Z
8
value 0.01814
scoring_system epss
scoring_elements 0.82852
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-15297
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15297
5
reference_url http://seclists.org/fulldisclosure/2021/Mar/5
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2021/Mar/5
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940060
reference_id 940060
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940060
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-15297
reference_id CVE-2019-15297
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-15297
fixed_packages
0
url pkg:apk/alpine/asterisk@16.5.1-r0?arch=aarch64&distroversion=v3.21&reponame=main
purl pkg:apk/alpine/asterisk@16.5.1-r0?arch=aarch64&distroversion=v3.21&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/asterisk@16.5.1-r0%3Farch=aarch64&distroversion=v3.21&reponame=main
aliases CVE-2019-15297
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-917e-7kp2-y3hw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/asterisk@16.5.1-r0%3Farch=aarch64&distroversion=v3.21&reponame=main