Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/poco@1.14.2-6?distro=trixie
Typedeb
Namespacedebian
Namepoco
Version1.14.2-6
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2yhr-1v3n-p7a4
vulnerability_id VCID-2yhr-1v3n-p7a4
summary
Integer Overflow or Wraparound
UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52389
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32656
published_at 2026-04-21T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32734
published_at 2026-04-11T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32697
published_at 2026-04-12T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.3267
published_at 2026-04-13T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32709
published_at 2026-04-16T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32686
published_at 2026-04-18T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32801
published_at 2026-04-02T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32837
published_at 2026-04-04T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32659
published_at 2026-04-07T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32707
published_at 2026-04-08T12:55:00Z
10
value 0.00132
scoring_system epss
scoring_elements 0.32733
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52389
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52389
2
reference_url https://github.com/pocoproject/poco/compare/poco-1.12.5p2-release...poco-1.13.0-release
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:09Z/
url https://github.com/pocoproject/poco/compare/poco-1.12.5p2-release...poco-1.13.0-release
3
reference_url https://github.com/pocoproject/poco/issues/4320
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:09Z/
url https://github.com/pocoproject/poco/issues/4320
4
reference_url https://pocoproject.org/blog/?p=1226
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:09Z/
url https://pocoproject.org/blog/?p=1226
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-52389
reference_id CVE-2023-52389
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-52389
fixed_packages
0
url pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.10.0-6%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/poco@1.10.0-6%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/poco@1.10.0-6%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.10.0-6%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.11.0-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/poco@1.13.0-6?distro=trixie
purl pkg:deb/debian/poco@1.13.0-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.13.0-6%3Fdistro=trixie
4
url pkg:deb/debian/poco@1.14.2-3?distro=trixie
purl pkg:deb/debian/poco@1.14.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-3%3Fdistro=trixie
5
url pkg:deb/debian/poco@1.14.2-6?distro=trixie
purl pkg:deb/debian/poco@1.14.2-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-6%3Fdistro=trixie
aliases CVE-2023-52389
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2yhr-1v3n-p7a4
1
url VCID-4zzy-q5zp-jkgm
vulnerability_id VCID-4zzy-q5zp-jkgm
summary A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3720.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3720
reference_id
reference_type
scores
0
value 0.01161
scoring_system epss
scoring_elements 0.78615
published_at 2026-04-21T12:55:00Z
1
value 0.01161
scoring_system epss
scoring_elements 0.7862
published_at 2026-04-16T12:55:00Z
2
value 0.01161
scoring_system epss
scoring_elements 0.78619
published_at 2026-04-18T12:55:00Z
3
value 0.01541
scoring_system epss
scoring_elements 0.81341
published_at 2026-04-04T12:55:00Z
4
value 0.01541
scoring_system epss
scoring_elements 0.81339
published_at 2026-04-07T12:55:00Z
5
value 0.01541
scoring_system epss
scoring_elements 0.81368
published_at 2026-04-08T12:55:00Z
6
value 0.01541
scoring_system epss
scoring_elements 0.81394
published_at 2026-04-11T12:55:00Z
7
value 0.01541
scoring_system epss
scoring_elements 0.81381
published_at 2026-04-12T12:55:00Z
8
value 0.01541
scoring_system epss
scoring_elements 0.81373
published_at 2026-04-13T12:55:00Z
9
value 0.01541
scoring_system epss
scoring_elements 0.8131
published_at 2026-04-01T12:55:00Z
10
value 0.01541
scoring_system epss
scoring_elements 0.81319
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=531697
reference_id 531697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=531697
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551936
reference_id 551936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=551936
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919
reference_id 560919
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920
reference_id 560920
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921
reference_id 560921
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922
reference_id 560922
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926
reference_id 560926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927
reference_id 560927
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928
reference_id 560928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929
reference_id 560929
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930
reference_id 560930
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935
reference_id 560935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936
reference_id 560936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937
reference_id 560937
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
reference_id 560940
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942
reference_id 560942
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560950
reference_id 560950
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560950
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053
reference_id 601053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053
21
reference_url https://httpd.apache.org/security/json/CVE-2009-3720.json
reference_id CVE-2009-3720
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-3720.json
22
reference_url https://security.gentoo.org/glsa/201209-06
reference_id GLSA-201209-06
reference_type
scores
url https://security.gentoo.org/glsa/201209-06
23
reference_url https://access.redhat.com/errata/RHSA-2009:1572
reference_id RHSA-2009:1572
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1572
24
reference_url https://access.redhat.com/errata/RHSA-2009:1625
reference_id RHSA-2009:1625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1625
25
reference_url https://access.redhat.com/errata/RHSA-2010:0002
reference_id RHSA-2010:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0002
26
reference_url https://access.redhat.com/errata/RHSA-2011:0491
reference_id RHSA-2011:0491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0491
27
reference_url https://access.redhat.com/errata/RHSA-2011:0492
reference_id RHSA-2011:0492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0492
28
reference_url https://access.redhat.com/errata/RHSA-2017:3239
reference_id RHSA-2017:3239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3239
29
reference_url https://usn.ubuntu.com/890-1/
reference_id USN-890-1
reference_type
scores
url https://usn.ubuntu.com/890-1/
30
reference_url https://usn.ubuntu.com/890-2/
reference_id USN-890-2
reference_type
scores
url https://usn.ubuntu.com/890-2/
31
reference_url https://usn.ubuntu.com/890-3/
reference_id USN-890-3
reference_type
scores
url https://usn.ubuntu.com/890-3/
32
reference_url https://usn.ubuntu.com/890-4/
reference_id USN-890-4
reference_type
scores
url https://usn.ubuntu.com/890-4/
33
reference_url https://usn.ubuntu.com/890-5/
reference_id USN-890-5
reference_type
scores
url https://usn.ubuntu.com/890-5/
34
reference_url https://usn.ubuntu.com/890-6/
reference_id USN-890-6
reference_type
scores
url https://usn.ubuntu.com/890-6/
fixed_packages
0
url pkg:deb/debian/poco@1.3.6p1-1?distro=trixie
purl pkg:deb/debian/poco@1.3.6p1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.3.6p1-1%3Fdistro=trixie
1
url pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.10.0-6%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.11.0-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/poco@1.13.0-6?distro=trixie
purl pkg:deb/debian/poco@1.13.0-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.13.0-6%3Fdistro=trixie
4
url pkg:deb/debian/poco@1.14.2-3?distro=trixie
purl pkg:deb/debian/poco@1.14.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-3%3Fdistro=trixie
5
url pkg:deb/debian/poco@1.14.2-6?distro=trixie
purl pkg:deb/debian/poco@1.14.2-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-6%3Fdistro=trixie
aliases CVE-2009-3720
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zzy-q5zp-jkgm
2
url VCID-546e-svdf-fyac
vulnerability_id VCID-546e-svdf-fyac
summary A vulnerability was found in poco up to 1.14.1. It has been rated as problematic. Affected by this issue is the function MultipartInputStream of the file Net/src/MultipartReader.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.14.2 is able to address this issue. The patch is identified as 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf. It is recommended to upgrade the affected component.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6375
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18816
published_at 2026-04-07T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.19009
published_at 2026-04-02T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18896
published_at 2026-04-08T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.19061
published_at 2026-04-04T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.1881
published_at 2026-04-16T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18859
published_at 2026-04-13T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.1891
published_at 2026-04-12T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18957
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.1895
published_at 2026-04-09T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37113
published_at 2026-04-21T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37169
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6375
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6375
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108157
reference_id 1108157
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108157
4
reference_url https://github.com/pocoproject/poco/issues/4915
reference_id 4915
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://github.com/pocoproject/poco/issues/4915
5
reference_url https://github.com/pocoproject/poco/commit/6f2f85913c191ab9ddfb8fae781f5d66afccf3bf
reference_id 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://github.com/pocoproject/poco/commit/6f2f85913c191ab9ddfb8fae781f5d66afccf3bf
6
reference_url https://vuldb.com/?ctiid.313370
reference_id ?ctiid.313370
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://vuldb.com/?ctiid.313370
7
reference_url https://vuldb.com/?id.313370
reference_id ?id.313370
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://vuldb.com/?id.313370
8
reference_url https://github.com/pocoproject/poco/releases/tag/poco-1.14.2-release
reference_id poco-1.14.2-release
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://github.com/pocoproject/poco/releases/tag/poco-1.14.2-release
9
reference_url https://github.com/user-attachments/files/19524599/poco_crash.txt
reference_id poco_crash.txt
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://github.com/user-attachments/files/19524599/poco_crash.txt
10
reference_url https://vuldb.com/?submit.597446
reference_id ?submit.597446
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://vuldb.com/?submit.597446
fixed_packages
0
url pkg:deb/debian/poco@1.14.2-2?distro=trixie
purl pkg:deb/debian/poco@1.14.2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-2%3Fdistro=trixie
1
url pkg:deb/debian/poco@1.14.2-3?distro=trixie
purl pkg:deb/debian/poco@1.14.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-3%3Fdistro=trixie
2
url pkg:deb/debian/poco@1.14.2-6?distro=trixie
purl pkg:deb/debian/poco@1.14.2-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-6%3Fdistro=trixie
aliases CVE-2025-6375
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-546e-svdf-fyac
3
url VCID-7pjn-2s13-d7by
vulnerability_id VCID-7pjn-2s13-d7by
summary The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0350
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42077
published_at 2026-04-01T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42136
published_at 2026-04-02T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42164
published_at 2026-04-09T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42103
published_at 2026-04-07T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42153
published_at 2026-04-08T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42186
published_at 2026-04-11T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42149
published_at 2026-04-12T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42123
published_at 2026-04-13T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42174
published_at 2026-04-16T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42148
published_at 2026-04-18T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42078
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0350
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0350
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746637
reference_id 746637
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746637
fixed_packages
0
url pkg:deb/debian/poco@1.3.6p1-5?distro=trixie
purl pkg:deb/debian/poco@1.3.6p1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.3.6p1-5%3Fdistro=trixie
1
url pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.10.0-6%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.11.0-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/poco@1.13.0-6?distro=trixie
purl pkg:deb/debian/poco@1.13.0-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.13.0-6%3Fdistro=trixie
4
url pkg:deb/debian/poco@1.14.2-3?distro=trixie
purl pkg:deb/debian/poco@1.14.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-3%3Fdistro=trixie
5
url pkg:deb/debian/poco@1.14.2-6?distro=trixie
purl pkg:deb/debian/poco@1.14.2-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-6%3Fdistro=trixie
aliases CVE-2014-0350
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7pjn-2s13-d7by
4
url VCID-9tkd-v4dq-2bd4
vulnerability_id VCID-9tkd-v4dq-2bd4
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000472
reference_id
reference_type
scores
0
value 0.0046
scoring_system epss
scoring_elements 0.64176
published_at 2026-04-18T12:55:00Z
1
value 0.0046
scoring_system epss
scoring_elements 0.64164
published_at 2026-04-21T12:55:00Z
2
value 0.0046
scoring_system epss
scoring_elements 0.64046
published_at 2026-04-01T12:55:00Z
3
value 0.0046
scoring_system epss
scoring_elements 0.64103
published_at 2026-04-02T12:55:00Z
4
value 0.0046
scoring_system epss
scoring_elements 0.6413
published_at 2026-04-04T12:55:00Z
5
value 0.0046
scoring_system epss
scoring_elements 0.64089
published_at 2026-04-07T12:55:00Z
6
value 0.0046
scoring_system epss
scoring_elements 0.6414
published_at 2026-04-08T12:55:00Z
7
value 0.0046
scoring_system epss
scoring_elements 0.64156
published_at 2026-04-09T12:55:00Z
8
value 0.0046
scoring_system epss
scoring_elements 0.64167
published_at 2026-04-11T12:55:00Z
9
value 0.0046
scoring_system epss
scoring_elements 0.64157
published_at 2026-04-12T12:55:00Z
10
value 0.0046
scoring_system epss
scoring_elements 0.64127
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000472
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000472
2
reference_url https://github.com/pocoproject/poco/issues/1968
reference_id
reference_type
scores
url https://github.com/pocoproject/poco/issues/1968
3
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00013.html
4
reference_url https://www.debian.org/security/2018/dsa-4083
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4083
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pocoproject:poco:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pocoproject:poco:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pocoproject:poco:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000472
reference_id CVE-2017-1000472
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000472
fixed_packages
0
url pkg:deb/debian/poco@1.8.0-2?distro=trixie
purl pkg:deb/debian/poco@1.8.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.8.0-2%3Fdistro=trixie
1
url pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.10.0-6%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.11.0-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/poco@1.13.0-6?distro=trixie
purl pkg:deb/debian/poco@1.13.0-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.13.0-6%3Fdistro=trixie
4
url pkg:deb/debian/poco@1.14.2-3?distro=trixie
purl pkg:deb/debian/poco@1.14.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-3%3Fdistro=trixie
5
url pkg:deb/debian/poco@1.14.2-6?distro=trixie
purl pkg:deb/debian/poco@1.14.2-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-6%3Fdistro=trixie
aliases CVE-2017-1000472
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tkd-v4dq-2bd4
5
url VCID-qtav-hqnd-b7fa
vulnerability_id VCID-qtav-hqnd-b7fa
summary A buffer over-read flaw was found in the bundled expat library. An attacker who is able to get Apache to parse an untrused XML document (for example through mod_dav) may be able to cause a crash. This crash would only be a denial of service if using the worker MPM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3560.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3560.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3560
reference_id
reference_type
scores
0
value 0.0283
scoring_system epss
scoring_elements 0.86182
published_at 2026-04-11T12:55:00Z
1
value 0.0283
scoring_system epss
scoring_elements 0.86111
published_at 2026-04-01T12:55:00Z
2
value 0.0283
scoring_system epss
scoring_elements 0.86121
published_at 2026-04-02T12:55:00Z
3
value 0.0283
scoring_system epss
scoring_elements 0.86137
published_at 2026-04-07T12:55:00Z
4
value 0.0283
scoring_system epss
scoring_elements 0.86156
published_at 2026-04-08T12:55:00Z
5
value 0.0283
scoring_system epss
scoring_elements 0.86168
published_at 2026-04-09T12:55:00Z
6
value 0.03008
scoring_system epss
scoring_elements 0.86598
published_at 2026-04-21T12:55:00Z
7
value 0.03008
scoring_system epss
scoring_elements 0.866
published_at 2026-04-16T12:55:00Z
8
value 0.03008
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-18T12:55:00Z
9
value 0.03311
scoring_system epss
scoring_elements 0.87257
published_at 2026-04-12T12:55:00Z
10
value 0.03311
scoring_system epss
scoring_elements 0.87253
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3560
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=533174
reference_id 533174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=533174
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560901
reference_id 560901
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560901
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919
reference_id 560919
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560919
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920
reference_id 560920
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560920
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921
reference_id 560921
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560921
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922
reference_id 560922
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560922
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926
reference_id 560926
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560926
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927
reference_id 560927
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560927
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928
reference_id 560928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560928
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929
reference_id 560929
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560929
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930
reference_id 560930
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560930
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935
reference_id 560935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560935
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936
reference_id 560936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560936
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937
reference_id 560937
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560937
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
reference_id 560940
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560940
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942
reference_id 560942
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560942
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053
reference_id 601053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=601053
20
reference_url https://httpd.apache.org/security/json/CVE-2009-3560.json
reference_id CVE-2009-3560
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2009-3560.json
21
reference_url https://security.gentoo.org/glsa/201209-06
reference_id GLSA-201209-06
reference_type
scores
url https://security.gentoo.org/glsa/201209-06
22
reference_url https://access.redhat.com/errata/RHSA-2009:1625
reference_id RHSA-2009:1625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1625
23
reference_url https://access.redhat.com/errata/RHSA-2017:3239
reference_id RHSA-2017:3239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3239
24
reference_url https://usn.ubuntu.com/890-1/
reference_id USN-890-1
reference_type
scores
url https://usn.ubuntu.com/890-1/
25
reference_url https://usn.ubuntu.com/890-2/
reference_id USN-890-2
reference_type
scores
url https://usn.ubuntu.com/890-2/
26
reference_url https://usn.ubuntu.com/890-3/
reference_id USN-890-3
reference_type
scores
url https://usn.ubuntu.com/890-3/
27
reference_url https://usn.ubuntu.com/890-4/
reference_id USN-890-4
reference_type
scores
url https://usn.ubuntu.com/890-4/
28
reference_url https://usn.ubuntu.com/890-5/
reference_id USN-890-5
reference_type
scores
url https://usn.ubuntu.com/890-5/
29
reference_url https://usn.ubuntu.com/890-6/
reference_id USN-890-6
reference_type
scores
url https://usn.ubuntu.com/890-6/
fixed_packages
0
url pkg:deb/debian/poco@1.3.6p1-1?distro=trixie
purl pkg:deb/debian/poco@1.3.6p1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.3.6p1-1%3Fdistro=trixie
1
url pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/poco@1.10.0-6%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.10.0-6%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.11.0-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/poco@1.13.0-6?distro=trixie
purl pkg:deb/debian/poco@1.13.0-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.13.0-6%3Fdistro=trixie
4
url pkg:deb/debian/poco@1.14.2-3?distro=trixie
purl pkg:deb/debian/poco@1.14.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-3%3Fdistro=trixie
5
url pkg:deb/debian/poco@1.14.2-6?distro=trixie
purl pkg:deb/debian/poco@1.14.2-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-6%3Fdistro=trixie
aliases CVE-2009-3560
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtav-hqnd-b7fa
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-6%3Fdistro=trixie