{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","type":"deb","namespace":"debian","name":"trafficserver","version":"8.1.10+ds-1~deb11u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"9.2.5+ds-0+deb12u3","latest_non_vulnerable_version":"9.2.5+ds-0+deb12u3","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96130?format=json","vulnerability_id":"VCID-4738-xk8n-hbac","summary":"Improper Input Validation vulnerability in Apache Traffic Server.  This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3.  Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38311","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24039","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23867","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23825","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24008","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5085","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.7305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.73","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.7302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.72996","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.73033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.73047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.73071","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38311"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099691","reference_id":"1099691","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099691"},{"reference_url":"https://lists.apache.org/thread/btofzws2yqskk2n7f01r3l1819x01023","reference_id":"btofzws2yqskk2n7f01r3l1819x01023","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:35:26Z/"}],"url":"https://lists.apache.org/thread/btofzws2yqskk2n7f01r3l1819x01023"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-38311"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4738-xk8n-hbac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/349305?format=json","vulnerability_id":"VCID-4hs3-be7k-9qe7","summary":"Apache Traffic Server allows request smuggling if chunked messages are malformed. \n\nThis issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1.\n\nUsers are recommended to upgrade to version 9.2.13 or 10.1.2, which fix the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-65114","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37207","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4329","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43358","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43424","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43984","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44002","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43969","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44031","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-65114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65114"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132717","reference_id":"1132717","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132717"},{"reference_url":"https://lists.apache.org/thread/2s11roxlv1j8ph6q52rqo1klvl01n14q","reference_id":"2s11roxlv1j8ph6q52rqo1klvl01n14q","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-02T18:09:43Z/"}],"url":"https://lists.apache.org/thread/2s11roxlv1j8ph6q52rqo1klvl01n14q"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2025-65114"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4hs3-be7k-9qe7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96312?format=json","vulnerability_id":"VCID-4uhe-mtbx-nfdu","summary":"Improper Access Control vulnerability in Apache Traffic Server.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.8, from 10.0.0 through 10.0.3.  Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56195","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17768","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21969","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39335","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70651","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70712","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56195"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099691","reference_id":"1099691","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099691"},{"reference_url":"https://lists.apache.org/thread/btofzws2yqskk2n7f01r3l1819x01023","reference_id":"btofzws2yqskk2n7f01r3l1819x01023","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:36:13Z/"}],"url":"https://lists.apache.org/thread/btofzws2yqskk2n7f01r3l1819x01023"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-56195"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4uhe-mtbx-nfdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69013?format=json","vulnerability_id":"VCID-5e1r-3jec-tkhp","summary":"trafficserver: Traffic Server ESI Inclusion Depth Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49763.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-49763.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49763","reference_id":"","reference_type":"","scores":[{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69415","published_at":"2026-04-04T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70094","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70165","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.8416","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03368","scoring_system":"epss","scoring_elements":"0.87399","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03368","scoring_system":"epss","scoring_elements":"0.87398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03368","scoring_system":"epss","scoring_elements":"0.87375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03368","scoring_system":"epss","scoring_elements":"0.87391","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03368","scoring_system":"epss","scoring_elements":"0.8738","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-49763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49763"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108044","reference_id":"1108044","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108044"},{"reference_url":"https://lists.apache.org/thread/15t32nxbypqg1m2smp640vjx89o6v5f8","reference_id":"15t32nxbypqg1m2smp640vjx89o6v5f8","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-20T13:56:03Z/"}],"url":"https://lists.apache.org/thread/15t32nxbypqg1m2smp640vjx89o6v5f8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373845","reference_id":"2373845","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373845"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2025-49763"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5e1r-3jec-tkhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96246?format=json","vulnerability_id":"VCID-c62p-6ghw-j3dv","summary":"Valid Host header field can cause Apache Traffic Server to crash on some platforms.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5.  Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-50305","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54812","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54804","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54847","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54856","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54816","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54854","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54837","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-50305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50305"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531","reference_id":"1087531","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531"},{"reference_url":"https://usn.ubuntu.com/8050-1/","reference_id":"USN-8050-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8050-1/"},{"reference_url":"https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y","reference_id":"y15fh6c7kyqvzm0f9odw7c5jh4r4np0y","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:12:16Z/"}],"url":"https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-50305"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c62p-6ghw-j3dv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96270?format=json","vulnerability_id":"VCID-eay7-63um-43e9","summary":"Apache Traffic Server allows request smuggling if chunked messages are malformed.       This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4.  Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53868","reference_id":"","reference_type":"","scores":[{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82748","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82618","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82632","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82669","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82706","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.8271","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53868"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101996","reference_id":"1101996","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101996"},{"reference_url":"https://lists.apache.org/thread/rwyx91rsrnmpjbm04footfjjf6m9d1c9","reference_id":"rwyx91rsrnmpjbm04footfjjf6m9d1c9","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-18T14:37:32Z/"}],"url":"https://lists.apache.org/thread/rwyx91rsrnmpjbm04footfjjf6m9d1c9"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-53868"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eay7-63um-43e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96104?format=json","vulnerability_id":"VCID-esap-nkps-cfg9","summary":"Invalid Accept-Encoding header can cause Apache Traffic Server to fail cache lookup and force forwarding requests.  This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4.  Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-35296","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31228","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31457","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31432","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31401","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-35296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35296"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141","reference_id":"1077141","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141"},{"reference_url":"https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0","reference_id":"c4mcmpblgl8kkmyt56t23543gp8v56m0","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-26T14:01:18Z/"}],"url":"https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-35296"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-esap-nkps-cfg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96247?format=json","vulnerability_id":"VCID-jabw-thzt-63bb","summary":"Unchecked return value can allow Apache Traffic Server to retain privileges on startup.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1.  Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-50306","reference_id":"","reference_type":"","scores":[{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74462","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74464","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74379","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74394","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74424","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74433","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74422","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-50306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50306"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531","reference_id":"1087531","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531"},{"reference_url":"https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y","reference_id":"y15fh6c7kyqvzm0f9odw7c5jh4r4np0y","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:07:42Z/"}],"url":"https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-50306"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jabw-thzt-63bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96103?format=json","vulnerability_id":"VCID-jb1b-9gr2-suez","summary":"Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable.  This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4.  Users can set a new setting (proxy.config.http.drop_chunked_trailers) not to forward chunked trailer section. Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-35161","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56591","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5659","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56608","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56651","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56682","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56653","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-35161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35161"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141","reference_id":"1077141","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141"},{"reference_url":"https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0","reference_id":"c4mcmpblgl8kkmyt56t23543gp8v56m0","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-31T17:38:35Z/"}],"url":"https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-35161"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jb1b-9gr2-suez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96313?format=json","vulnerability_id":"VCID-kjah-am9e-xkev","summary":"Expected Behavior Violation vulnerability in Apache Traffic Server.  This issue affects Apache Traffic Server: from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3.  Users are recommended to upgrade to versions 9.2.9 or 10.0.4 or newer, which fixes the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56202","reference_id":"","reference_type":"","scores":[{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34493","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34047","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33961","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34478","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34438","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54556","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54549","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.546","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54607","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-56202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56202"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099691","reference_id":"1099691","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099691"},{"reference_url":"https://lists.apache.org/thread/btofzws2yqskk2n7f01r3l1819x01023","reference_id":"btofzws2yqskk2n7f01r3l1819x01023","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:38:08Z/"}],"url":"https://lists.apache.org/thread/btofzws2yqskk2n7f01r3l1819x01023"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-56202"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kjah-am9e-xkev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96145?format=json","vulnerability_id":"VCID-rcdg-j23x-xfbn","summary":"Improper Input Validation vulnerability in Apache Traffic Server.  This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5.  Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38479","reference_id":"","reference_type":"","scores":[{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68816","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68804","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.6881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.6868","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68769","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68755","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68767","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68756","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38479"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531","reference_id":"1087531","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087531"},{"reference_url":"https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y","reference_id":"y15fh6c7kyqvzm0f9odw7c5jh4r4np0y","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:51:08Z/"}],"url":"https://lists.apache.org/thread/y15fh6c7kyqvzm0f9odw7c5jh4r4np0y"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2024-38479"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rcdg-j23x-xfbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95645?format=json","vulnerability_id":"VCID-rw58-bnwt-2bam","summary":"Apache Traffic Server accepts characters that are not allowed for HTTP field names and forwards malformed requests to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable.  This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4.  Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38522","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58478","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58448","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58501","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58507","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58524","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58485","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58521","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.585","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38522"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141","reference_id":"1077141","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077141"},{"reference_url":"https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0","reference_id":"c4mcmpblgl8kkmyt56t23543gp8v56m0","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T13:37:29Z/"}],"url":"https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2023-38522"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rw58-bnwt-2bam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69012?format=json","vulnerability_id":"VCID-tevw-8dcp-yfh6","summary":"trafficserver: Apache Traffic Server PROXY Protocol ACL Bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31698.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31698.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31698","reference_id":"","reference_type":"","scores":[{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44088","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44139","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00743","scoring_system":"epss","scoring_elements":"0.73056","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73282","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73284","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00753","scoring_system":"epss","scoring_elements":"0.73237","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31698"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108044","reference_id":"1108044","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108044"},{"reference_url":"https://lists.apache.org/thread/15t32nxbypqg1m2smp640vjx89o6v5f8","reference_id":"15t32nxbypqg1m2smp640vjx89o6v5f8","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-20T13:31:33Z/"}],"url":"https://lists.apache.org/thread/15t32nxbypqg1m2smp640vjx89o6v5f8"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373846","reference_id":"2373846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2373846"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2025-31698"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tevw-8dcp-yfh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/349615?format=json","vulnerability_id":"VCID-ww3t-p3pq-gkhy","summary":"A bug in POST request handling causes a crash under a certain condition.  This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12.  Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue.  A workaround for older versions is to set proxy.config.http.request_buffer_enabled to 0 (the default value is 0).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58136","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12268","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.4001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47341","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47362","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47336","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47343","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47402","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52693","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52677","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52628","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52638","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52601","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58136"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132717","reference_id":"1132717","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132717"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994490?format=json","purl":"pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3"}],"aliases":["CVE-2025-58136"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ww3t-p3pq-gkhy"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95178?format=json","vulnerability_id":"VCID-41x7-hv4u-byb9","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32749","reference_id":"","reference_type":"","scores":[{"value":"0.00921","scoring_system":"epss","scoring_elements":"0.75944","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00921","scoring_system":"epss","scoring_elements":"0.75912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80028","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.79999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01339","scoring_system":"epss","scoring_elements":"0.80008","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06551","scoring_system":"epss","scoring_elements":"0.91175","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06551","scoring_system":"epss","scoring_elements":"0.91178","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06551","scoring_system":"epss","scoring_elements":"0.91171","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06551","scoring_system":"epss","scoring_elements":"0.91137","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06551","scoring_system":"epss","scoring_elements":"0.91136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06551","scoring_system":"epss","scoring_elements":"0.91161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06551","scoring_system":"epss","scoring_elements":"0.91164","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392"},{"reference_url":"https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02","reference_id":"mrj2lg4s0hf027rk7gz8t7hbn9xpfg02","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-17T14:20:46Z/"}],"url":"https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-32749"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-41x7-hv4u-byb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95550?format=json","vulnerability_id":"VCID-4men-293s-3bhn","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33934","reference_id":"","reference_type":"","scores":[{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.5319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.5328","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53266","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53248","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60741","published_at":"2026-04-24T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60746","published_at":"2026-04-29T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60768","published_at":"2026-04-18T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60753","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430","reference_id":"1043430","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/","reference_id":"BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/"},{"reference_url":"https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc","reference_id":"jsl6dfdgs1mjjo1mbtyflyjr7xftswhc","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/"}],"url":"https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html","reference_id":"msg00042.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2023-33934"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4men-293s-3bhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94834?format=json","vulnerability_id":"VCID-4wwn-74ac-p7dp","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37150","reference_id":"","reference_type":"","scores":[{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78658","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78536","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78581","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78607","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78602","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.7853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01159","scoring_system":"epss","scoring_elements":"0.78549","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/","reference_id":"CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5206","reference_id":"dsa-5206","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/"}],"url":"https://www.debian.org/security/2022/dsa-5206"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html"},{"reference_url":"https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21","reference_id":"rc64lwbdgrkv674koc3zl1sljr9vwg21","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/"}],"url":"https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/","reference_id":"ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T18:45:09Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-37150"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4wwn-74ac-p7dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87395?format=json","vulnerability_id":"VCID-568b-s8ks-vfa6","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17565","reference_id":"","reference_type":"","scores":[{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79051","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78961","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.7897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78999","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78984","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78974","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79029","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481"},{"reference_url":"https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E"},{"reference_url":"https://www.debian.org/security/2020/dsa-4672","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4672"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17565","reference_id":"CVE-2019-17565","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17565"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2019-17565"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-568b-s8ks-vfa6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4443?format=json","vulnerability_id":"VCID-5781-s1ny-q7ey","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44487.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44487.json"},{"reference_url":"https://akka.io/security/akka-http-cve-2023-44487.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://akka.io/security/akka-http-cve-2023-44487.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-44487","reference_id":"","reference_type":"","scores":[{"value":"0.94385","scoring_system":"epss","scoring_elements":"0.99971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.94385","scoring_system":"epss","scoring_elements":"0.9997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.94395","scoring_system":"epss","scoring_elements":"0.99974","published_at":"2026-04-18T12:55:00Z"},{"value":"0.944","scoring_system":"epss","scoring_elements":"0.99976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.9446","scoring_system":"epss","scoring_elements":"0.99993","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-44487"},{"reference_url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size"},{"reference_url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/"},{"reference_url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011"},{"reference_url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"},{"reference_url":"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack"},{"reference_url":"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/"},{"reference_url":"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack"},{"reference_url":"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/"},{"reference_url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty"},{"reference_url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/"},{"reference_url":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1216123","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1216123"},{"reference_url":"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9"},{"reference_url":"https://chaos.social/@icing/111210915918780532","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://chaos.social/@icing/111210915918780532"},{"reference_url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps"},{"reference_url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/"},{"reference_url":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"},{"reference_url":"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752"},{"reference_url":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715"},{"reference_url":"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve"},{"reference_url":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088"},{"reference_url":"https://github.com/akka/akka-http/issues/4323","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/akka/akka-http/issues/4323"},{"reference_url":"https://github.com/akka/akka-http/pull/4324","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/akka/akka-http/pull/4324"},{"reference_url":"https://github.com/akka/akka-http/pull/4325","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/akka/akka-http/pull/4325"},{"reference_url":"https://github.com/alibaba/tengine/issues/1872","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/alibaba/tengine/issues/1872"},{"reference_url":"https://github.com/apache/apisix/issues/10320","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/apache/apisix/issues/10320"},{"reference_url":"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113"},{"reference_url":"https://github.com/apache/httpd-site/pull/10","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/apache/httpd-site/pull/10"},{"reference_url":"https://github.com/apache/tomcat/commit/6d1a9fd6642387969e4410b9989c85856b74917a","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/tomcat/commit/6d1a9fd6642387969e4410b9989c85856b74917a"},{"reference_url":"https://github.com/apache/tomcat/commit/76bb4bfbfeae827dce896f650655bbf6e251ed49","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/tomcat/commit/76bb4bfbfeae827dce896f650655bbf6e251ed49"},{"reference_url":"https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628"},{"reference_url":"https://github.com/apache/tomcat/commit/9cdfe25bad707f34b3e5da2994f3f1952a163c3e","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/tomcat/commit/9cdfe25bad707f34b3e5da2994f3f1952a163c3e"},{"reference_url":"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2"},{"reference_url":"https://github.com/apache/trafficserver/pull/10564","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/apache/trafficserver/pull/10564"},{"reference_url":"https://github.com/apple/swift-nio-http2","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apple/swift-nio-http2"},{"reference_url":"https://github.com/Azure/AKS/issues/3947","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/Azure/AKS/issues/3947"},{"reference_url":"https://github.com/caddyserver/caddy/issues/5877","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/caddyserver/caddy/issues/5877"},{"reference_url":"https://github.com/caddyserver/caddy/releases/tag/v2.7.5","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/caddyserver/caddy/releases/tag/v2.7.5"},{"reference_url":"https://github.com/dotnet/announcements/issues/277","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/dotnet/announcements/issues/277"},{"reference_url":"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73"},{"reference_url":"https://github.com/eclipse/jetty.project/issues/10679","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/eclipse/jetty.project/issues/10679"},{"reference_url":"https://github.com/envoyproxy/envoy/pull/30055","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/envoyproxy/envoy/pull/30055"},{"reference_url":"https://github.com/etcd-io/etcd/issues/16740","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/etcd-io/etcd/issues/16740"},{"reference_url":"https://github.com/facebook/proxygen/pull/466","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/facebook/proxygen/pull/466"},{"reference_url":"https://github.com/golang/go/issues/63417","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/golang/go/issues/63417"},{"reference_url":"https://github.com/grpc/grpc-go/pull/6703","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/grpc/grpc-go/pull/6703"},{"reference_url":"https://github.com/grpc/grpc-go/releases","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/grpc/grpc-go/releases"},{"reference_url":"https://github.com/grpc/grpc/releases/tag/v1.59.2","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/grpc/grpc/releases/tag/v1.59.2"},{"reference_url":"https://github.com/h2o/h2o/pull/3291","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/h2o/h2o/pull/3291"},{"reference_url":"https://github.com/haproxy/haproxy/issues/2312","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/haproxy/haproxy/issues/2312"},{"reference_url":"https://github.com/hyperium/hyper/issues/3337","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/hyperium/hyper/issues/3337"},{"reference_url":"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244"},{"reference_url":"https://github.com/junkurihara/rust-rpxy/issues/97","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/junkurihara/rust-rpxy/issues/97"},{"reference_url":"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1"},{"reference_url":"https://github.com/kazu-yamamoto/http2/issues/93","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/kazu-yamamoto/http2/issues/93"},{"reference_url":"https://github.com/Kong/kong/discussions/11741","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/Kong/kong/discussions/11741"},{"reference_url":"https://github.com/kubernetes/kubernetes/pull/121120","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/kubernetes/kubernetes/pull/121120"},{"reference_url":"https://github.com/line/armeria/pull/5232","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/line/armeria/pull/5232"},{"reference_url":"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632"},{"reference_url":"https://github.com/micrictor/http2-rst-stream","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/micrictor/http2-rst-stream"},{"reference_url":"https://github.com/microsoft/CBL-Mariner/pull/6381","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/microsoft/CBL-Mariner/pull/6381"},{"reference_url":"https://github.com/netty/netty","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/netty/netty"},{"reference_url":"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61"},{"reference_url":"https://github.com/nghttp2/nghttp2","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/nghttp2/nghttp2"},{"reference_url":"https://github.com/nghttp2/nghttp2/commit/72b4af6143681f528f1d237b21a9a7aee1738832","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/nghttp2/nghttp2/commit/72b4af6143681f528f1d237b21a9a7aee1738832"},{"reference_url":"https://github.com/nghttp2/nghttp2/pull/1961","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/nghttp2/nghttp2/pull/1961"},{"reference_url":"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0"},{"reference_url":"https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg"},{"reference_url":"https://github.com/ninenines/cowboy/issues/1615","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/ninenines/cowboy/issues/1615"},{"reference_url":"https://github.com/nodejs/node/pull/50121","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/nodejs/node/pull/50121"},{"reference_url":"https://github.com/openresty/openresty/issues/930","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/openresty/openresty/issues/930"},{"reference_url":"https://github.com/opensearch-project/data-prepper/issues/3474","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/opensearch-project/data-prepper/issues/3474"},{"reference_url":"https://github.com/oqtane/oqtane.framework/discussions/3367","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/oqtane/oqtane.framework/discussions/3367"},{"reference_url":"https://github.com/projectcontour/contour/pull/5826","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/projectcontour/contour/pull/5826"},{"reference_url":"https://github.com/tempesta-tech/tempesta/issues/1986","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/tempesta-tech/tempesta/issues/1986"},{"reference_url":"https://github.com/varnishcache/varnish-cache/issues/3996","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/varnishcache/varnish-cache/issues/3996"},{"reference_url":"https://go.dev/cl/534215","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/cl/534215"},{"reference_url":"https://go.dev/cl/534235","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/cl/534235"},{"reference_url":"https://go.dev/issue/63417","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/issue/63417"},{"reference_url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo"},{"reference_url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ"},{"reference_url":"https://istio.io/latest/news/security/istio-security-2023-004","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://istio.io/latest/news/security/istio-security-2023-004"},{"reference_url":"https://istio.io/latest/news/security/istio-security-2023-004/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://istio.io/latest/news/security/istio-security-2023-004/"},{"reference_url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487"},{"reference_url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/"},{"reference_url":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4"},{"reference_url":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html"},{"reference_url":"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html"},{"reference_url":"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html"},{"reference_url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2"},{"reference_url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/"},{"reference_url":"https://my.f5.com/manage/s/article/K000137106","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://my.f5.com/manage/s/article/K000137106"},{"reference_url":"https://netty.io/news/2023/10/10/4-1-100-Final.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://netty.io/news/2023/10/10/4-1-100-Final.html"},{"reference_url":"https://news.ycombinator.com/item?id=37830987","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://news.ycombinator.com/item?id=37830987"},{"reference_url":"https://news.ycombinator.com/item?id=37830998","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://news.ycombinator.com/item?id=37830998"},{"reference_url":"https://news.ycombinator.com/item?id=37831062","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://news.ycombinator.com/item?id=37831062"},{"reference_url":"https://news.ycombinator.com/item?id=37837043","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://news.ycombinator.com/item?id=37837043"},{"reference_url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response"},{"reference_url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/"},{"reference_url":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected"},{"reference_url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ"},{"reference_url":"https://security.gentoo.org/glsa/202311-09","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://security.gentoo.org/glsa/202311-09"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231016-0001","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20231016-0001"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231016-0001/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231016-0001/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0007","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20240426-0007"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0006","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20240621-0006"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0007","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20240621-0007"},{"reference_url":"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14"},{"reference_url":"https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12"},{"reference_url":"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94"},{"reference_url":"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81"},{"reference_url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records"},{"reference_url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/"},{"reference_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-44487"},{"reference_url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"},{"reference_url":"https://www.cve.org/CVERecord?id=CVE-2023-44487","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.cve.org/CVERecord?id=CVE-2023-44487"},{"reference_url":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event"},{"reference_url":"https://www.debian.org/security/2023/dsa-5521","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.debian.org/security/2023/dsa-5521"},{"reference_url":"https://www.debian.org/security/2023/dsa-5522","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.debian.org/security/2023/dsa-5522"},{"reference_url":"https://www.debian.org/security/2023/dsa-5540","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.debian.org/security/2023/dsa-5540"},{"reference_url":"https://www.debian.org/security/2023/dsa-5549","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.debian.org/security/2023/dsa-5549"},{"reference_url":"https://www.debian.org/security/2023/dsa-5558","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.debian.org/security/2023/dsa-5558"},{"reference_url":"https://www.debian.org/security/2023/dsa-5570","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.debian.org/security/2023/dsa-5570"},{"reference_url":"https://www.eclipse.org/lists/jetty-announce/msg00181.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.eclipse.org/lists/jetty-announce/msg00181.html"},{"reference_url":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487"},{"reference_url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487"},{"reference_url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/"},{"reference_url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products"},{"reference_url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"},{"reference_url":"https://www.openwall.com/lists/oss-security/2023/10/10/6","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.openwall.com/lists/oss-security/2023/10/10/6"},{"reference_url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"},{"reference_url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday"},{"reference_url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/"},{"reference_url":"https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/10/6","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/10/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/10/7","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/10/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/13/4","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/13/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/13/9","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/13/9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/18/4","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/18/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/18/8","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/18/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/19/6","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/19/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/20/8","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/20/8"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053769","reference_id":"1053769","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053769"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053770","reference_id":"1053770","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053801","reference_id":"1053801","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053801"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054232","reference_id":"1054232","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054232"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054234","reference_id":"1054234","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054234"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056156","reference_id":"1056156","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056156"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074421","reference_id":"1074421","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074421"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/","reference_id":"2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/","reference_id":"3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/","reference_id":"BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/","reference_id":"CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"},{"reference_url":"https://access.redhat.com/security/cve/cve-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://access.redhat.com/security/cve/cve-2023-44487"},{"reference_url":"https://blog.vespa.ai/cve-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://blog.vespa.ai/cve-2023-44487"},{"reference_url":"https://blog.vespa.ai/cve-2023-44487/","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://blog.vespa.ai/cve-2023-44487/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"Important","scoring_system":"apache_tomcat","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487"},{"reference_url":"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487"},{"reference_url":"https://github.com/bcdannyboy/CVE-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/bcdannyboy/CVE-2023-44487"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52426.py","reference_id":"CVE-2023-44487","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/52426.py"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487"},{"reference_url":"https://security.paloaltonetworks.com/CVE-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://security.paloaltonetworks.com/CVE-2023-44487"},{"reference_url":"https://ubuntu.com/security/CVE-2023-44487","reference_id":"CVE-2023-44487","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://ubuntu.com/security/CVE-2023-44487"},{"reference_url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack","reference_id":"CVE-2023-44487-HTTP-2-RAPID-RESET-ATTACK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/","reference_id":"E72T67UPDRXHIDLO3OROR25YAMN4GGW5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/","reference_id":"FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/"},{"reference_url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf","reference_id":"GHSA-2m7v-gc89-fjqf","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"},{"reference_url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3","reference_id":"GHSA-qppj-fm5r-hxr3","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3"},{"reference_url":"https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3","reference_id":"GHSA-qppj-fm5r-hxr3","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3"},{"reference_url":"https://github.com/advisories/GHSA-vx74-f528-fxqg","reference_id":"GHSA-vx74-f528-fxqg","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/advisories/GHSA-vx74-f528-fxqg"},{"reference_url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p","reference_id":"GHSA-xpw8-rcwv-8f8p","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"},{"reference_url":"https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p","reference_id":"GHSA-xpw8-rcwv-8f8p","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p"},{"reference_url":"https://security.gentoo.org/glsa/202408-10","reference_id":"GLSA-202408-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202408-10"},{"reference_url":"https://security.gentoo.org/glsa/202412-14","reference_id":"GLSA-202412-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-14"},{"reference_url":"https://security.gentoo.org/glsa/202505-11","reference_id":"GLSA-202505-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-11"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/","reference_id":"HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/","reference_id":"KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/","reference_id":"LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/","reference_id":"LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0007/","reference_id":"ntap-20240426-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0007/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0007/","reference_id":"ntap-20240621-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240621-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5006","reference_id":"RHSA-2023:5006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5009","reference_id":"RHSA-2023:5009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5530","reference_id":"RHSA-2023:5530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5541","reference_id":"RHSA-2023:5541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5542","reference_id":"RHSA-2023:5542","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5542"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5679","reference_id":"RHSA-2023:5679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5705","reference_id":"RHSA-2023:5705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5706","reference_id":"RHSA-2023:5706","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5706"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5707","reference_id":"RHSA-2023:5707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5708","reference_id":"RHSA-2023:5708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5709","reference_id":"RHSA-2023:5709","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5709"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5710","reference_id":"RHSA-2023:5710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5711","reference_id":"RHSA-2023:5711","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5712","reference_id":"RHSA-2023:5712","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5712"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5713","reference_id":"RHSA-2023:5713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5713"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5714","reference_id":"RHSA-2023:5714","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5714"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5715","reference_id":"RHSA-2023:5715","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5715"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5716","reference_id":"RHSA-2023:5716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5717","reference_id":"RHSA-2023:5717","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5717"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5719","reference_id":"RHSA-2023:5719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5720","reference_id":"RHSA-2023:5720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5721","reference_id":"RHSA-2023:5721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5724","reference_id":"RHSA-2023:5724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5738","reference_id":"RHSA-2023:5738","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5738"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5749","reference_id":"RHSA-2023:5749","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5749"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5764","reference_id":"RHSA-2023:5764","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5764"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5765","reference_id":"RHSA-2023:5765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5766","reference_id":"RHSA-2023:5766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5767","reference_id":"RHSA-2023:5767","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5768","reference_id":"RHSA-2023:5768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5769","reference_id":"RHSA-2023:5769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5770","reference_id":"RHSA-2023:5770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5780","reference_id":"RHSA-2023:5780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5783","reference_id":"RHSA-2023:5783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5784","reference_id":"RHSA-2023:5784","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5801","reference_id":"RHSA-2023:5801","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5801"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5802","reference_id":"RHSA-2023:5802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5803","reference_id":"RHSA-2023:5803","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5803"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5805","reference_id":"RHSA-2023:5805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5835","reference_id":"RHSA-2023:5835","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5835"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5837","reference_id":"RHSA-2023:5837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5838","reference_id":"RHSA-2023:5838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5840","reference_id":"RHSA-2023:5840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5841","reference_id":"RHSA-2023:5841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5849","reference_id":"RHSA-2023:5849","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5849"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5850","reference_id":"RHSA-2023:5850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5851","reference_id":"RHSA-2023:5851","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5851"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5863","reference_id":"RHSA-2023:5863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5864","reference_id":"RHSA-2023:5864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5864"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5865","reference_id":"RHSA-2023:5865","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5866","reference_id":"RHSA-2023:5866","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5867","reference_id":"RHSA-2023:5867","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5867"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5869","reference_id":"RHSA-2023:5869","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5869"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5896","reference_id":"RHSA-2023:5896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5902","reference_id":"RHSA-2023:5902","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5902"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5920","reference_id":"RHSA-2023:5920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5922","reference_id":"RHSA-2023:5922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5924","reference_id":"RHSA-2023:5924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5924"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5928","reference_id":"RHSA-2023:5928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5929","reference_id":"RHSA-2023:5929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5929"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5930","reference_id":"RHSA-2023:5930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5931","reference_id":"RHSA-2023:5931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5933","reference_id":"RHSA-2023:5933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5935","reference_id":"RHSA-2023:5935","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5935"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5945","reference_id":"RHSA-2023:5945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5946","reference_id":"RHSA-2023:5946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5947","reference_id":"RHSA-2023:5947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5956","reference_id":"RHSA-2023:5956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5964","reference_id":"RHSA-2023:5964","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5964"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5965","reference_id":"RHSA-2023:5965","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5965"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5967","reference_id":"RHSA-2023:5967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5969","reference_id":"RHSA-2023:5969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5970","reference_id":"RHSA-2023:5970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5971","reference_id":"RHSA-2023:5971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5973","reference_id":"RHSA-2023:5973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5974","reference_id":"RHSA-2023:5974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5976","reference_id":"RHSA-2023:5976","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5976"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5978","reference_id":"RHSA-2023:5978","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5978"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5979","reference_id":"RHSA-2023:5979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5980","reference_id":"RHSA-2023:5980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5982","reference_id":"RHSA-2023:5982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5989","reference_id":"RHSA-2023:5989","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5989"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6020","reference_id":"RHSA-2023:6020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6021","reference_id":"RHSA-2023:6021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6022","reference_id":"RHSA-2023:6022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6023","reference_id":"RHSA-2023:6023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6030","reference_id":"RHSA-2023:6030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6031","reference_id":"RHSA-2023:6031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6039","reference_id":"RHSA-2023:6039","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6039"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6040","reference_id":"RHSA-2023:6040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6041","reference_id":"RHSA-2023:6041","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6042","reference_id":"RHSA-2023:6042","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6048","reference_id":"RHSA-2023:6048","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6048"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6057","reference_id":"RHSA-2023:6057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6059","reference_id":"RHSA-2023:6059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6061","reference_id":"RHSA-2023:6061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6077","reference_id":"RHSA-2023:6077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6079","reference_id":"RHSA-2023:6079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6080","reference_id":"RHSA-2023:6080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6084","reference_id":"RHSA-2023:6084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6105","reference_id":"RHSA-2023:6105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6106","reference_id":"RHSA-2023:6106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6114","reference_id":"RHSA-2023:6114","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6115","reference_id":"RHSA-2023:6115","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6117","reference_id":"RHSA-2023:6117","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6117"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6118","reference_id":"RHSA-2023:6118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6120","reference_id":"RHSA-2023:6120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6129","reference_id":"RHSA-2023:6129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6129"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6137","reference_id":"RHSA-2023:6137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6144","reference_id":"RHSA-2023:6144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6154","reference_id":"RHSA-2023:6154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6154"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6161","reference_id":"RHSA-2023:6161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6165","reference_id":"RHSA-2023:6165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6179","reference_id":"RHSA-2023:6179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6217","reference_id":"RHSA-2023:6217","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6217"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6233","reference_id":"RHSA-2023:6233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6235","reference_id":"RHSA-2023:6235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6239","reference_id":"RHSA-2023:6239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6248","reference_id":"RHSA-2023:6248","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6248"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6251","reference_id":"RHSA-2023:6251","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6251"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6269","reference_id":"RHSA-2023:6269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6272","reference_id":"RHSA-2023:6272","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6272"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6280","reference_id":"RHSA-2023:6280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6286","reference_id":"RHSA-2023:6286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6296","reference_id":"RHSA-2023:6296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6298","reference_id":"RHSA-2023:6298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6305","reference_id":"RHSA-2023:6305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6746","reference_id":"RHSA-2023:6746","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6746"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6779","reference_id":"RHSA-2023:6779","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6781","reference_id":"RHSA-2023:6781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6782","reference_id":"RHSA-2023:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6783","reference_id":"RHSA-2023:6783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6784","reference_id":"RHSA-2023:6784","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6785","reference_id":"RHSA-2023:6785","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6786","reference_id":"RHSA-2023:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6787","reference_id":"RHSA-2023:6787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6788","reference_id":"RHSA-2023:6788","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6817","reference_id":"RHSA-2023:6817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6818","reference_id":"RHSA-2023:6818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6832","reference_id":"RHSA-2023:6832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6836","reference_id":"RHSA-2023:6836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6837","reference_id":"RHSA-2023:6837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6839","reference_id":"RHSA-2023:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6840","reference_id":"RHSA-2023:6840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7198","reference_id":"RHSA-2023:7198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7205","reference_id":"RHSA-2023:7205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7215","reference_id":"RHSA-2023:7215","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7215"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7218","reference_id":"RHSA-2023:7218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7288","reference_id":"RHSA-2023:7288","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7315","reference_id":"RHSA-2023:7315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7325","reference_id":"RHSA-2023:7325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7334","reference_id":"RHSA-2023:7334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7335","reference_id":"RHSA-2023:7335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7344","reference_id":"RHSA-2023:7344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7345","reference_id":"RHSA-2023:7345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7345"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7481","reference_id":"RHSA-2023:7481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7482","reference_id":"RHSA-2023:7482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7482"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7483","reference_id":"RHSA-2023:7483","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7483"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7484","reference_id":"RHSA-2023:7484","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7484"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7486","reference_id":"RHSA-2023:7486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7488","reference_id":"RHSA-2023:7488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7521","reference_id":"RHSA-2023:7521","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7522","reference_id":"RHSA-2023:7522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7555","reference_id":"RHSA-2023:7555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7587","reference_id":"RHSA-2023:7587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7610","reference_id":"RHSA-2023:7610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7682","reference_id":"RHSA-2023:7682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7687","reference_id":"RHSA-2023:7687","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7687"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7699","reference_id":"RHSA-2023:7699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7703","reference_id":"RHSA-2023:7703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7704","reference_id":"RHSA-2023:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7741","reference_id":"RHSA-2023:7741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0269","reference_id":"RHSA-2024:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0302","reference_id":"RHSA-2024:0302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0777","reference_id":"RHSA-2024:0777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1444","reference_id":"RHSA-2024:1444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1770","reference_id":"RHSA-2024:1770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2633","reference_id":"RHSA-2024:2633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2633"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4631","reference_id":"RHSA-2024:4631","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4631"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:16668","reference_id":"RHSA-2025:16668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:16668"},{"reference_url":"https://usn.ubuntu.com/6427-1/","reference_id":"USN-6427-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6427-1/"},{"reference_url":"https://usn.ubuntu.com/6427-2/","reference_id":"USN-6427-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6427-2/"},{"reference_url":"https://usn.ubuntu.com/6438-1/","reference_id":"USN-6438-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6438-1/"},{"reference_url":"https://usn.ubuntu.com/6505-1/","reference_id":"USN-6505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6505-1/"},{"reference_url":"https://usn.ubuntu.com/6574-1/","reference_id":"USN-6574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6574-1/"},{"reference_url":"https://usn.ubuntu.com/6754-1/","reference_id":"USN-6754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6754-1/"},{"reference_url":"https://usn.ubuntu.com/6994-1/","reference_id":"USN-6994-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6994-1/"},{"reference_url":"https://usn.ubuntu.com/7067-1/","reference_id":"USN-7067-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7067-1/"},{"reference_url":"https://usn.ubuntu.com/7410-1/","reference_id":"USN-7410-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7410-1/"},{"reference_url":"https://usn.ubuntu.com/7469-1/","reference_id":"USN-7469-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7469-1/"},{"reference_url":"https://usn.ubuntu.com/7469-2/","reference_id":"USN-7469-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7469-2/"},{"reference_url":"https://usn.ubuntu.com/7469-3/","reference_id":"USN-7469-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7469-3/"},{"reference_url":"https://usn.ubuntu.com/7469-4/","reference_id":"USN-7469-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7469-4/"},{"reference_url":"https://usn.ubuntu.com/7892-1/","reference_id":"USN-7892-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7892-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","reference_id":"VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/","reference_id":"VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/","reference_id":"WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/","reference_id":"WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/","reference_id":"X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/","reference_id":"XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/","reference_id":"ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/","reference_id":"ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2024-07-23T20:34:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2023-44487","GHSA-2m7v-gc89-fjqf","GHSA-qppj-fm5r-hxr3","GHSA-vx74-f528-fxqg","GHSA-xpw8-rcwv-8f8p","GMS-2023-3377","VSV00013"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5781-s1ny-q7ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87394?format=json","vulnerability_id":"VCID-6bwv-cd3d-mudb","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17559","reference_id":"","reference_type":"","scores":[{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.8046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80478","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80492","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80517","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01409","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481"},{"reference_url":"https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E"},{"reference_url":"https://www.debian.org/security/2020/dsa-4672","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4672"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17559","reference_id":"CVE-2019-17559","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17559"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2019-17559"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6bwv-cd3d-mudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95231?format=json","vulnerability_id":"VCID-73aa-rk27-tye1","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37392","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03006","scoring_system":"epss","scoring_elements":"0.86617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03006","scoring_system":"epss","scoring_elements":"0.8661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03006","scoring_system":"epss","scoring_elements":"0.86618","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03006","scoring_system":"epss","scoring_elements":"0.86588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03006","scoring_system":"epss","scoring_elements":"0.86581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03006","scoring_system":"epss","scoring_elements":"0.86594","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03006","scoring_system":"epss","scoring_elements":"0.86599","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03006","scoring_system":"epss","scoring_elements":"0.86592","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-37392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37392"},{"reference_url":"https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02","reference_id":"mrj2lg4s0hf027rk7gz8t7hbn9xpfg02","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-17T14:20:03Z/"}],"url":"https://lists.apache.org/thread/mrj2lg4s0hf027rk7gz8t7hbn9xpfg02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-37392"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73aa-rk27-tye1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95110?format=json","vulnerability_id":"VCID-7nhc-5p2x-t3cj","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25763","reference_id":"","reference_type":"","scores":[{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63165","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63142","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.6313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63152","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63166","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63064","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63093","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63126","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63143","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-25763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/","reference_id":"CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5206","reference_id":"dsa-5206","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/"}],"url":"https://www.debian.org/security/2022/dsa-5206"},{"reference_url":"https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21","reference_id":"rc64lwbdgrkv674koc3zl1sljr9vwg21","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/"}],"url":"https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/","reference_id":"ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-20T17:58:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-25763"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7nhc-5p2x-t3cj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90968?format=json","vulnerability_id":"VCID-931v-ukcc-6qaa","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44040","reference_id":"","reference_type":"","scores":[{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87067","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.8711","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.8713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.8712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87136","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.8714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87156","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87162","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0325","scoring_system":"epss","scoring_elements":"0.87163","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-44040"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-931v-ukcc-6qaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82269?format=json","vulnerability_id":"VCID-aqt5-2ffy-9bgs","summary":"HTTP/2: flood using SETTINGS frames results in unbounded memory growth","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9515","reference_id":"","reference_type":"","scores":[{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92657","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92658","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92635","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92639","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.9264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09046","scoring_system":"epss","scoring_elements":"0.92652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10394","scoring_system":"epss","scoring_elements":"0.93194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10394","scoring_system":"epss","scoring_elements":"0.93185","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735745","reference_id":"1735745","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735745"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886","reference_id":"934886","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887","reference_id":"934887","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0922","reference_id":"RHSA-2020:0922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0983","reference_id":"RHSA-2020:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1445","reference_id":"RHSA-2020:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2067","reference_id":"RHSA-2020:2067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2565","reference_id":"RHSA-2020:2565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3196","reference_id":"RHSA-2020:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3197","reference_id":"RHSA-2020:3197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5856","reference_id":"RHSA-2024:5856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5856"},{"reference_url":"https://usn.ubuntu.com/USN-4866-1/","reference_id":"USN-USN-4866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2019-9515"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aqt5-2ffy-9bgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95167?format=json","vulnerability_id":"VCID-b7zx-ywwc-57d9","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31778","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40474","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00554","scoring_system":"epss","scoring_elements":"0.68025","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00554","scoring_system":"epss","scoring_elements":"0.68076","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00554","scoring_system":"epss","scoring_elements":"0.6809","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00554","scoring_system":"epss","scoring_elements":"0.68115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02716","scoring_system":"epss","scoring_elements":"0.8593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02716","scoring_system":"epss","scoring_elements":"0.85925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02716","scoring_system":"epss","scoring_elements":"0.85944","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02716","scoring_system":"epss","scoring_elements":"0.85947","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02716","scoring_system":"epss","scoring_elements":"0.85938","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02716","scoring_system":"epss","scoring_elements":"0.85958","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02716","scoring_system":"epss","scoring_elements":"0.85967","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-31778"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b7zx-ywwc-57d9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95125?format=json","vulnerability_id":"VCID-bb5y-kjej-bbfm","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28129","reference_id":"","reference_type":"","scores":[{"value":"0.02871","scoring_system":"epss","scoring_elements":"0.86284","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02871","scoring_system":"epss","scoring_elements":"0.86303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02871","scoring_system":"epss","scoring_elements":"0.86313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02871","scoring_system":"epss","scoring_elements":"0.86312","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.89209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.89219","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.8917","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.89213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.89225","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.89215","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.89184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.89187","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04574","scoring_system":"epss","scoring_elements":"0.89205","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-28129"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5y-kjej-bbfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95322?format=json","vulnerability_id":"VCID-bdgg-edbf-xfav","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47184","reference_id":"","reference_type":"","scores":[{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46461","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46522","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46464","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46456","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248","reference_id":"1038248","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/","reference_id":"6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5435","reference_id":"dsa-5435","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/"}],"url":"https://www.debian.org/security/2023/dsa-5435"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/","reference_id":"FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html","reference_id":"msg00037.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html"},{"reference_url":"https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs","reference_id":"tns2b4khyyncgs5v5p9y35pobg9z2bvs","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:43:40Z/"}],"url":"https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-47184"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdgg-edbf-xfav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86114?format=json","vulnerability_id":"VCID-btm9-vxvc-3qhv","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10079","reference_id":"","reference_type":"","scores":[{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89854","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.8979","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89807","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89811","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89828","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89835","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89841","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89832","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.89846","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05102","scoring_system":"epss","scoring_elements":"0.8984","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518"},{"reference_url":"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10079","reference_id":"CVE-2019-10079","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-10079"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2019-10079"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-btm9-vxvc-3qhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82270?format=json","vulnerability_id":"VCID-c5hc-3jtx-k3a6","summary":"HTTP/2: flood using empty frames results in excessive resource consumption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9518.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9518","reference_id":"","reference_type":"","scores":[{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.8789","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.8787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87893","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87825","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.8785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87868","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.8786","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87874","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03645","scoring_system":"epss","scoring_elements":"0.87873","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04696","scoring_system":"epss","scoring_elements":"0.89316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04696","scoring_system":"epss","scoring_elements":"0.89311","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735749","reference_id":"1735749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735749"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935314","reference_id":"935314","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935314"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0922","reference_id":"RHSA-2020:0922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0983","reference_id":"RHSA-2020:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1445","reference_id":"RHSA-2020:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3196","reference_id":"RHSA-2020:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3197","reference_id":"RHSA-2020:3197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3197"},{"reference_url":"https://usn.ubuntu.com/USN-4866-1/","reference_id":"USN-USN-4866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2019-9518"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c5hc-3jtx-k3a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90949?format=json","vulnerability_id":"VCID-c675-5njd-63hk","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27577","reference_id":"","reference_type":"","scores":[{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78957","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78975","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.78971","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.79001","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.79008","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01205","scoring_system":"epss","scoring_elements":"0.79024","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303","reference_id":"990303","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-27577"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c675-5njd-63hk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90969?format=json","vulnerability_id":"VCID-cbe5-hhz8-bqbn","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44759","reference_id":"","reference_type":"","scores":[{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83625","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83641","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83713","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83739","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83747","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02005","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-44759"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbe5-hhz8-bqbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90951?format=json","vulnerability_id":"VCID-cscf-sb71-jybq","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32566","reference_id":"","reference_type":"","scores":[{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92013","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92019","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92051","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92063","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92061","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.9206","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303","reference_id":"990303","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-32566"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cscf-sb71-jybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87397?format=json","vulnerability_id":"VCID-fmwc-nmhh-ryaf","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9481","reference_id":"","reference_type":"","scores":[{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89916","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.8992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89938","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.8996","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89974","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89975","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89971","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89988","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05231","scoring_system":"epss","scoring_elements":"0.89986","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2020-9481"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fmwc-nmhh-ryaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90965?format=json","vulnerability_id":"VCID-fq5y-b9yq-nbee","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37148","reference_id":"","reference_type":"","scores":[{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.76995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77001","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.7703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77011","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77097","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77099","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.7709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77131","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77146","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-37148"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fq5y-b9yq-nbee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54711?format=json","vulnerability_id":"VCID-hbte-dsw2-y7ad","summary":"golang.org/x/net/http vulnerable to ping floods\nSome HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.\n\n### Specific Go Packages Affected\ngolang.org/x/net/http2","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2594","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2661","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2682","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2690","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2726","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2766","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2769","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2796","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2796"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2861","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2925","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2939","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2955","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2966","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3131","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3131"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3245","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3265","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3892","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3906","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4018","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4019","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4020","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4021","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4040","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4041","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4042","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4045","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4269","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4273","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4352","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0406","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2020:0406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0727","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2020:0727"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9512.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9512","reference_id":"","reference_type":"","scores":[{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97891","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97858","published_at":"2026-04-01T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97873","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.9788","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.9789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97886","published_at":"2026-04-24T12:55:00Z"},{"value":"0.51232","scoring_system":"epss","scoring_elements":"0.97887","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Aug/16","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/fulldisclosure/2019/Aug/16"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md"},{"reference_url":"https://go.dev/cl/190137","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/cl/190137"},{"reference_url":"https://go.dev/issue/33606","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/issue/33606"},{"reference_url":"https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5"},{"reference_url":"https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ"},{"reference_url":"https://kb.cert.org/vuls/id/605641","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://kb.cert.org/vuls/id/605641"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10296","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10296"},{"reference_url":"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9512","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9512"},{"reference_url":"https://pkg.go.dev/vuln/GO-2022-0536","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://pkg.go.dev/vuln/GO-2022-0536"},{"reference_url":"https://seclists.org/bugtraq/2019/Aug/24","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://seclists.org/bugtraq/2019/Aug/24"},{"reference_url":"https://seclists.org/bugtraq/2019/Aug/31","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://seclists.org/bugtraq/2019/Aug/31"},{"reference_url":"https://seclists.org/bugtraq/2019/Aug/43","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://seclists.org/bugtraq/2019/Aug/43"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/18","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://seclists.org/bugtraq/2019/Sep/18"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190823-0001","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20190823-0001"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190823-0004","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20190823-0004"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190823-0005","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20190823-0005"},{"reference_url":"https://support.f5.com/csp/article/K98053339","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.f5.com/csp/article/K98053339"},{"reference_url":"https://support.f5.com/csp/article/K98053339?utm_source=f5support&amp;utm_medium=RSS","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.f5.com/csp/article/K98053339?utm_source=f5support&amp;utm_medium=RSS"},{"reference_url":"https://usn.ubuntu.com/4308-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/4308-1"},{"reference_url":"https://www.debian.org/security/2019/dsa-4503","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2019/dsa-4503"},{"reference_url":"https://www.debian.org/security/2019/dsa-4508","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2019/dsa-4508"},{"reference_url":"https://www.debian.org/security/2019/dsa-4520","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2019/dsa-4520"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_19_33","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.synology.com/security/advisory/Synology_SA_19_33"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/08/20/1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2019/08/20/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735645","reference_id":"1735645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735645"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886","reference_id":"934886","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887","reference_id":"934887","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887"},{"reference_url":"https://security.archlinux.org/ASA-201908-15","reference_id":"ASA-201908-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201908-15"},{"reference_url":"https://security.archlinux.org/AVG-1021","reference_id":"AVG-1021","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2817","reference_id":"RHSA-2019:2817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0922","reference_id":"RHSA-2020:0922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0983","reference_id":"RHSA-2020:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1445","reference_id":"RHSA-2020:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2067","reference_id":"RHSA-2020:2067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2565","reference_id":"RHSA-2020:2565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3196","reference_id":"RHSA-2020:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3197","reference_id":"RHSA-2020:3197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5856","reference_id":"RHSA-2024:5856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5856"},{"reference_url":"https://usn.ubuntu.com/USN-4866-1/","reference_id":"USN-USN-4866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2019-9512","GHSA-hgr8-6h9x-f7q9"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hbte-dsw2-y7ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90867?format=json","vulnerability_id":"VCID-j6r7-ypa1-zybv","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17509","reference_id":"","reference_type":"","scores":[{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86623","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86653","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86696","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86699","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86725","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03046","scoring_system":"epss","scoring_elements":"0.86726","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2020-17509"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6r7-ypa1-zybv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95696?format=json","vulnerability_id":"VCID-jdjf-3w9k-xbaw","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41752","reference_id":"","reference_type":"","scores":[{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57326","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57321","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.5728","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00347","scoring_system":"epss","scoring_elements":"0.57261","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-41752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054427","reference_id":"1054427","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054427"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/","reference_id":"VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-13T19:48:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2023-41752"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jdjf-3w9k-xbaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87396?format=json","vulnerability_id":"VCID-k2ks-3t6e-uqgu","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1944","reference_id":"","reference_type":"","scores":[{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79051","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78934","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78961","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.7897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78999","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78984","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78974","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79029","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1944"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9481"},{"reference_url":"https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r99d18d0bc4daa05e7d0e5a63e0e22701a421b2ef5a8f4f7694c43869%40%3Cannounce.trafficserver.apache.org%3E"},{"reference_url":"https://www.debian.org/security/2020/dsa-4672","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2020/dsa-4672"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1944","reference_id":"CVE-2020-1944","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1944"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2020-1944"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ks-3t6e-uqgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55688?format=json","vulnerability_id":"VCID-n66u-b73u-zucb","summary":"golang.org/x/net/http vulnerable to a reset flood\nSome HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.\n\n### Specific Go Packages Affected\ngolang.org/x/net/http2","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2594","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2661","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2682","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2690","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2726","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2766","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2769","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2796","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2796"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2861","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2925","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2939","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2955","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2966","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:2966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3131","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3131"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3245","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3265","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3892","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3906","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:3906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4018","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4019","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4020","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4021","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4040","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4041","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4041"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4042","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4042"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4045","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4045"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4269","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4273","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4352","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:4352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0406","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2020:0406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0727","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2020:0727"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9514.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9514.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9514","reference_id":"","reference_type":"","scores":[{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.9281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92809","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92818","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92822","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92826","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92836","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92841","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.92848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09483","scoring_system":"epss","scoring_elements":"0.9285","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Aug/16","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/fulldisclosure/2019/Aug/16"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md"},{"reference_url":"https://go.dev/cl/190137","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/cl/190137"},{"reference_url":"https://go.dev/issue/33606","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.dev/issue/33606"},{"reference_url":"https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5"},{"reference_url":"https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ"},{"reference_url":"https://kb.cert.org/vuls/id/605641","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://kb.cert.org/vuls/id/605641"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10296","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10296"},{"reference_url":"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9514","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9514"},{"reference_url":"https://pkg.go.dev/vuln/GO-2022-0536","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://pkg.go.dev/vuln/GO-2022-0536"},{"reference_url":"https://seclists.org/bugtraq/2019/Aug/24","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://seclists.org/bugtraq/2019/Aug/24"},{"reference_url":"https://seclists.org/bugtraq/2019/Aug/31","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://seclists.org/bugtraq/2019/Aug/31"},{"reference_url":"https://seclists.org/bugtraq/2019/Aug/43","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://seclists.org/bugtraq/2019/Aug/43"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/18","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://seclists.org/bugtraq/2019/Sep/18"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190823-0001","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20190823-0001"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190823-0004","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20190823-0004"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190823-0005","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20190823-0005"},{"reference_url":"https://support.f5.com/csp/article/K01988340","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.f5.com/csp/article/K01988340"},{"reference_url":"https://support.f5.com/csp/article/K01988340?utm_source=f5support&amp;utm_medium=RSS","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.f5.com/csp/article/K01988340?utm_source=f5support&amp;utm_medium=RSS"},{"reference_url":"https://usn.ubuntu.com/4308-1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/4308-1"},{"reference_url":"https://www.debian.org/security/2019/dsa-4503","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2019/dsa-4503"},{"reference_url":"https://www.debian.org/security/2019/dsa-4508","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2019/dsa-4508"},{"reference_url":"https://www.debian.org/security/2019/dsa-4520","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2019/dsa-4520"},{"reference_url":"https://www.debian.org/security/2020/dsa-4669","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2020/dsa-4669"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_19_33","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.synology.com/security/advisory/Synology_SA_19_33"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/08/20/1","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2019/08/20/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/18/8","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2023/10/18/8"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062667","reference_id":"1062667","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062667"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735744","reference_id":"1735744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1735744"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885","reference_id":"934885","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886","reference_id":"934886","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887","reference_id":"934887","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934887"},{"reference_url":"https://security.archlinux.org/ASA-201908-15","reference_id":"ASA-201908-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201908-15"},{"reference_url":"https://security.archlinux.org/AVG-1021","reference_id":"AVG-1021","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2817","reference_id":"RHSA-2019:2817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0922","reference_id":"RHSA-2020:0922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0983","reference_id":"RHSA-2020:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1445","reference_id":"RHSA-2020:1445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2067","reference_id":"RHSA-2020:2067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2565","reference_id":"RHSA-2020:2565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3196","reference_id":"RHSA-2020:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3197","reference_id":"RHSA-2020:3197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5856","reference_id":"RHSA-2024:5856","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5856"},{"reference_url":"https://usn.ubuntu.com/USN-4866-1/","reference_id":"USN-USN-4866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2019-9514","GHSA-39qc-96h7-956f"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n66u-b73u-zucb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95169?format=json","vulnerability_id":"VCID-p5f7-uu6r-8bez","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31780","reference_id":"","reference_type":"","scores":[{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.8953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89545","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89549","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91838","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91848","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91865","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91861","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91849","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91817","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07584","scoring_system":"epss","scoring_elements":"0.91825","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-31780"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5f7-uu6r-8bez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90866?format=json","vulnerability_id":"VCID-pxaf-6qxa-77h9","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17508","reference_id":"","reference_type":"","scores":[{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85704","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85741","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.8576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85786","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85783","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.8578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85798","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85802","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.85829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02656","scoring_system":"epss","scoring_elements":"0.8583","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-17508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17509"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2020-17508"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pxaf-6qxa-77h9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95549?format=json","vulnerability_id":"VCID-skrs-cynm-r7du","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33933","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33517","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33551","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34637","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35038","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35023","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34976","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34746","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34727","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-33933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248","reference_id":"1038248","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/","reference_id":"6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5435","reference_id":"dsa-5435","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/"}],"url":"https://www.debian.org/security/2023/dsa-5435"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/","reference_id":"FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html","reference_id":"msg00037.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html"},{"reference_url":"https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs","reference_id":"tns2b4khyyncgs5v5p9y35pobg9z2bvs","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:54:57Z/"}],"url":"https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2023-33933"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-skrs-cynm-r7du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90964?format=json","vulnerability_id":"VCID-t559-a5u6-4ke1","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37147","reference_id":"","reference_type":"","scores":[{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70964","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71023","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.7103","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71059","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71101","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.7111","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71115","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-37147"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t559-a5u6-4ke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95323?format=json","vulnerability_id":"VCID-u5qg-vszr-9ye2","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47185","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5846","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58516","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58494","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58473","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58469","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58443","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58495","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58502","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58519","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430","reference_id":"1043430","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/","reference_id":"BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/"},{"reference_url":"https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc","reference_id":"jsl6dfdgs1mjjo1mbtyflyjr7xftswhc","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/"}],"url":"https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html","reference_id":"msg00042.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-47185"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u5qg-vszr-9ye2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90966?format=json","vulnerability_id":"VCID-uhqf-tsxe-ayc2","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37149","reference_id":"","reference_type":"","scores":[{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.76995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77001","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.7703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77011","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77043","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77061","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77056","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77097","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77099","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.7709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77131","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77146","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-37149"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhqf-tsxe-ayc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90953?format=json","vulnerability_id":"VCID-uhxq-9bzs-u3fd","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35474","reference_id":"","reference_type":"","scores":[{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92679","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92693","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92691","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92706","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.9271","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.9273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09211","scoring_system":"epss","scoring_elements":"0.92725","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303","reference_id":"990303","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-35474"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhxq-9bzs-u3fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95515?format=json","vulnerability_id":"VCID-uy1m-av2n-jybt","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-30631","reference_id":"","reference_type":"","scores":[{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.69986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.7","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.69977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0062","scoring_system":"epss","scoring_elements":"0.70041","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00662","scoring_system":"epss","scoring_elements":"0.71179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00662","scoring_system":"epss","scoring_elements":"0.71165","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00662","scoring_system":"epss","scoring_elements":"0.71148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00662","scoring_system":"epss","scoring_elements":"0.71194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00662","scoring_system":"epss","scoring_elements":"0.71201","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00662","scoring_system":"epss","scoring_elements":"0.71233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00662","scoring_system":"epss","scoring_elements":"0.71241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00662","scoring_system":"epss","scoring_elements":"0.71244","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-30631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33933"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248","reference_id":"1038248","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038248"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2023-30631"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uy1m-av2n-jybt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90967?format=json","vulnerability_id":"VCID-w42s-4aps-y3c5","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-38161","reference_id":"","reference_type":"","scores":[{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78586","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78593","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78605","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.7863","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78665","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.7866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.7869","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01167","scoring_system":"epss","scoring_elements":"0.78715","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-38161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44759"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-38161"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w42s-4aps-y3c5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76985?format=json","vulnerability_id":"VCID-waer-as81-8fed","summary":"trafficserver: CONTINUATION frames DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31309.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31309","reference_id":"","reference_type":"","scores":[{"value":"0.02839","scoring_system":"epss","scoring_elements":"0.86139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02839","scoring_system":"epss","scoring_elements":"0.86174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02839","scoring_system":"epss","scoring_elements":"0.86155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03661","scoring_system":"epss","scoring_elements":"0.87892","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03661","scoring_system":"epss","scoring_elements":"0.87898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03661","scoring_system":"epss","scoring_elements":"0.87887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03661","scoring_system":"epss","scoring_elements":"0.87905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03661","scoring_system":"epss","scoring_elements":"0.87891","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10847","scoring_system":"epss","scoring_elements":"0.93399","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10847","scoring_system":"epss","scoring_elements":"0.93394","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10847","scoring_system":"epss","scoring_elements":"0.934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10847","scoring_system":"epss","scoring_elements":"0.93404","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31309"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068417","reference_id":"1068417","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269627","reference_id":"2269627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269627"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/10/7","reference_id":"7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/10/7"},{"reference_url":"https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc","reference_id":"f9qh3g3jvy153wh82pz4onrfj1wh13kc","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/"}],"url":"https://lists.apache.org/thread/f9qh3g3jvy153wh82pz4onrfj1wh13kc"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/","reference_id":"PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBKLPQ6ECG4PGEPRCYI3Y3OITNDEFCCV/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/","reference_id":"QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV77HYM7ARSTL3B6U3IFG7PHDU65WL4I/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/","reference_id":"T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-12T18:21:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3XON6RM5ZKCZ6K6NB7BOTAWMJQKXJDO/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2024-31309"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-waer-as81-8fed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90952?format=json","vulnerability_id":"VCID-xh97-4sn5-vyfw","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32567","reference_id":"","reference_type":"","scores":[{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92013","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92019","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92051","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92063","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92061","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.92064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07927","scoring_system":"epss","scoring_elements":"0.9206","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303","reference_id":"990303","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-32567"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xh97-4sn5-vyfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90942?format=json","vulnerability_id":"VCID-xwdc-hndy-yubc","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9494","reference_id":"","reference_type":"","scores":[{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86907","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86937","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.8693","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.8695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86957","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.8696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86975","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86979","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03178","scoring_system":"epss","scoring_elements":"0.86978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03451","scoring_system":"epss","scoring_elements":"0.87545","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03451","scoring_system":"epss","scoring_elements":"0.87551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03451","scoring_system":"epss","scoring_elements":"0.8755","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-9494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963629","reference_id":"963629","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963629"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2020-9494"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwdc-hndy-yubc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95168?format=json","vulnerability_id":"VCID-xwru-y5m9-gucd","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31779","reference_id":"","reference_type":"","scores":[{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44036","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72314","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72326","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00714","scoring_system":"epss","scoring_elements":"0.72349","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0345","scoring_system":"epss","scoring_elements":"0.87515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0345","scoring_system":"epss","scoring_elements":"0.87512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0345","scoring_system":"epss","scoring_elements":"0.87527","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0345","scoring_system":"epss","scoring_elements":"0.87529","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0345","scoring_system":"epss","scoring_elements":"0.87542","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0345","scoring_system":"epss","scoring_elements":"0.87549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0345","scoring_system":"epss","scoring_elements":"0.87548","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31780"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2022-31779"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwru-y5m9-gucd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90950?format=json","vulnerability_id":"VCID-zmh1-wmct-uyf7","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32565","reference_id":"","reference_type":"","scores":[{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90365","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90369","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90382","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90389","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90397","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.9039","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90406","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05675","scoring_system":"epss","scoring_elements":"0.90413","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-32565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35474"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303","reference_id":"990303","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990303"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037083?format=json","purl":"pkg:deb/debian/trafficserver@8.0.2%2Bds-1%2Bdeb10u6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-41x7-hv4u-byb9"},{"vulnerability":"VCID-4men-293s-3bhn"},{"vulnerability":"VCID-4wwn-74ac-p7dp"},{"vulnerability":"VCID-568b-s8ks-vfa6"},{"vulnerability":"VCID-5781-s1ny-q7ey"},{"vulnerability":"VCID-6bwv-cd3d-mudb"},{"vulnerability":"VCID-73aa-rk27-tye1"},{"vulnerability":"VCID-7nhc-5p2x-t3cj"},{"vulnerability":"VCID-931v-ukcc-6qaa"},{"vulnerability":"VCID-aqt5-2ffy-9bgs"},{"vulnerability":"VCID-b7zx-ywwc-57d9"},{"vulnerability":"VCID-bb5y-kjej-bbfm"},{"vulnerability":"VCID-bdgg-edbf-xfav"},{"vulnerability":"VCID-btm9-vxvc-3qhv"},{"vulnerability":"VCID-c5hc-3jtx-k3a6"},{"vulnerability":"VCID-c675-5njd-63hk"},{"vulnerability":"VCID-cbe5-hhz8-bqbn"},{"vulnerability":"VCID-cscf-sb71-jybq"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-fmwc-nmhh-ryaf"},{"vulnerability":"VCID-fq5y-b9yq-nbee"},{"vulnerability":"VCID-hbte-dsw2-y7ad"},{"vulnerability":"VCID-j6r7-ypa1-zybv"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-jdjf-3w9k-xbaw"},{"vulnerability":"VCID-k2ks-3t6e-uqgu"},{"vulnerability":"VCID-n66u-b73u-zucb"},{"vulnerability":"VCID-p5f7-uu6r-8bez"},{"vulnerability":"VCID-pxaf-6qxa-77h9"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-skrs-cynm-r7du"},{"vulnerability":"VCID-t559-a5u6-4ke1"},{"vulnerability":"VCID-u5qg-vszr-9ye2"},{"vulnerability":"VCID-uhqf-tsxe-ayc2"},{"vulnerability":"VCID-uhxq-9bzs-u3fd"},{"vulnerability":"VCID-uy1m-av2n-jybt"},{"vulnerability":"VCID-w42s-4aps-y3c5"},{"vulnerability":"VCID-waer-as81-8fed"},{"vulnerability":"VCID-xh97-4sn5-vyfw"},{"vulnerability":"VCID-xwdc-hndy-yubc"},{"vulnerability":"VCID-xwru-y5m9-gucd"},{"vulnerability":"VCID-zmh1-wmct-uyf7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.0.2%252Bds-1%252Bdeb10u6"},{"url":"http://public2.vulnerablecode.io/api/packages/994489?format=json","purl":"pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4738-xk8n-hbac"},{"vulnerability":"VCID-4hs3-be7k-9qe7"},{"vulnerability":"VCID-4uhe-mtbx-nfdu"},{"vulnerability":"VCID-5e1r-3jec-tkhp"},{"vulnerability":"VCID-c62p-6ghw-j3dv"},{"vulnerability":"VCID-eay7-63um-43e9"},{"vulnerability":"VCID-esap-nkps-cfg9"},{"vulnerability":"VCID-jabw-thzt-63bb"},{"vulnerability":"VCID-jb1b-9gr2-suez"},{"vulnerability":"VCID-kjah-am9e-xkev"},{"vulnerability":"VCID-rcdg-j23x-xfbn"},{"vulnerability":"VCID-rw58-bnwt-2bam"},{"vulnerability":"VCID-tevw-8dcp-yfh6"},{"vulnerability":"VCID-ww3t-p3pq-gkhy"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}],"aliases":["CVE-2021-32565"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zmh1-wmct-uyf7"}],"risk_score":"4.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1"}